Oct 11 02:44:52 localhost kernel: Linux version 5.14.0-284.11.1.el9_2.x86_64 (mockbuild@x86-vm-09.build.eng.bos.redhat.com) (gcc (GCC) 11.3.1 20221121 (Red Hat 11.3.1-4), GNU ld version 2.35.2-37.el9) #1 SMP PREEMPT_DYNAMIC Wed Apr 12 10:45:03 EDT 2023 Oct 11 02:44:52 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Oct 11 02:44:52 localhost kernel: Command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Oct 11 02:44:52 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 11 02:44:52 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 11 02:44:52 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 11 02:44:52 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 11 02:44:52 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Oct 11 02:44:52 localhost kernel: signal: max sigframe size: 1776 Oct 11 02:44:52 localhost kernel: BIOS-provided physical RAM map: Oct 11 02:44:52 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 11 02:44:52 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 11 02:44:52 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 11 02:44:52 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Oct 11 02:44:52 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Oct 11 02:44:52 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Oct 11 02:44:52 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 11 02:44:52 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000043fffffff] usable Oct 11 02:44:52 localhost kernel: NX (Execute Disable) protection: active Oct 11 02:44:52 localhost kernel: SMBIOS 2.8 present. Oct 11 02:44:52 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Oct 11 02:44:52 localhost kernel: Hypervisor detected: KVM Oct 11 02:44:52 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 11 02:44:52 localhost kernel: kvm-clock: using sched offset of 3098233055 cycles Oct 11 02:44:52 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 11 02:44:52 localhost kernel: tsc: Detected 2799.998 MHz processor Oct 11 02:44:52 localhost kernel: last_pfn = 0x440000 max_arch_pfn = 0x400000000 Oct 11 02:44:52 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 11 02:44:52 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Oct 11 02:44:52 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Oct 11 02:44:52 localhost kernel: Using GB pages for direct mapping Oct 11 02:44:52 localhost kernel: RAMDISK: [mem 0x2eef4000-0x33771fff] Oct 11 02:44:52 localhost kernel: ACPI: Early table checksum verification disabled Oct 11 02:44:52 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Oct 11 02:44:52 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 11 02:44:52 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 11 02:44:52 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 11 02:44:52 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Oct 11 02:44:52 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 11 02:44:52 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 11 02:44:52 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Oct 11 02:44:52 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Oct 11 02:44:52 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Oct 11 02:44:52 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Oct 11 02:44:52 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Oct 11 02:44:52 localhost kernel: No NUMA configuration found Oct 11 02:44:52 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000043fffffff] Oct 11 02:44:52 localhost kernel: NODE_DATA(0) allocated [mem 0x43ffd5000-0x43fffffff] Oct 11 02:44:52 localhost kernel: Reserving 256MB of memory at 2800MB for crashkernel (System RAM: 16383MB) Oct 11 02:44:52 localhost kernel: Zone ranges: Oct 11 02:44:52 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 11 02:44:52 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Oct 11 02:44:52 localhost kernel: Normal [mem 0x0000000100000000-0x000000043fffffff] Oct 11 02:44:52 localhost kernel: Device empty Oct 11 02:44:52 localhost kernel: Movable zone start for each node Oct 11 02:44:52 localhost kernel: Early memory node ranges Oct 11 02:44:52 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 11 02:44:52 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Oct 11 02:44:52 localhost kernel: node 0: [mem 0x0000000100000000-0x000000043fffffff] Oct 11 02:44:52 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000043fffffff] Oct 11 02:44:52 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 11 02:44:52 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 11 02:44:52 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Oct 11 02:44:52 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Oct 11 02:44:52 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 11 02:44:52 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 11 02:44:52 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 11 02:44:52 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 11 02:44:52 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 11 02:44:52 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 11 02:44:52 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 11 02:44:52 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 11 02:44:52 localhost kernel: TSC deadline timer available Oct 11 02:44:52 localhost kernel: smpboot: Allowing 8 CPUs, 0 hotplug CPUs Oct 11 02:44:52 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Oct 11 02:44:52 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Oct 11 02:44:52 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Oct 11 02:44:52 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Oct 11 02:44:52 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Oct 11 02:44:52 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Oct 11 02:44:52 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Oct 11 02:44:52 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Oct 11 02:44:52 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Oct 11 02:44:52 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Oct 11 02:44:52 localhost kernel: Booting paravirtualized kernel on KVM Oct 11 02:44:52 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 11 02:44:52 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Oct 11 02:44:52 localhost kernel: percpu: Embedded 55 pages/cpu s188416 r8192 d28672 u262144 Oct 11 02:44:52 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Oct 11 02:44:52 localhost kernel: Fallback order for Node 0: 0 Oct 11 02:44:52 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 4128475 Oct 11 02:44:52 localhost kernel: Policy zone: Normal Oct 11 02:44:52 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Oct 11 02:44:52 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64", will be passed to user space. Oct 11 02:44:52 localhost kernel: Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Oct 11 02:44:52 localhost kernel: Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Oct 11 02:44:52 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 11 02:44:52 localhost kernel: software IO TLB: area num 8. Oct 11 02:44:52 localhost kernel: Memory: 2873456K/16776676K available (14342K kernel code, 5536K rwdata, 10180K rodata, 2792K init, 7524K bss, 741260K reserved, 0K cma-reserved) Oct 11 02:44:52 localhost kernel: random: get_random_u64 called from kmem_cache_open+0x1e/0x210 with crng_init=0 Oct 11 02:44:52 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Oct 11 02:44:52 localhost kernel: ftrace: allocating 44803 entries in 176 pages Oct 11 02:44:52 localhost kernel: ftrace: allocated 176 pages with 3 groups Oct 11 02:44:52 localhost kernel: Dynamic Preempt: voluntary Oct 11 02:44:52 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Oct 11 02:44:52 localhost kernel: rcu: #011RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Oct 11 02:44:52 localhost kernel: #011Trampoline variant of Tasks RCU enabled. Oct 11 02:44:52 localhost kernel: #011Rude variant of Tasks RCU enabled. Oct 11 02:44:52 localhost kernel: #011Tracing variant of Tasks RCU enabled. Oct 11 02:44:52 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 11 02:44:52 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Oct 11 02:44:52 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Oct 11 02:44:52 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Oct 11 02:44:52 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Oct 11 02:44:52 localhost kernel: random: crng init done (trusting CPU's manufacturer) Oct 11 02:44:52 localhost kernel: Console: colour VGA+ 80x25 Oct 11 02:44:52 localhost kernel: printk: console [tty0] enabled Oct 11 02:44:52 localhost kernel: printk: console [ttyS0] enabled Oct 11 02:44:52 localhost kernel: ACPI: Core revision 20211217 Oct 11 02:44:52 localhost kernel: APIC: Switch to symmetric I/O mode setup Oct 11 02:44:52 localhost kernel: x2apic enabled Oct 11 02:44:52 localhost kernel: Switched APIC routing to physical x2apic. Oct 11 02:44:52 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Oct 11 02:44:52 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Oct 11 02:44:52 localhost kernel: pid_max: default: 32768 minimum: 301 Oct 11 02:44:52 localhost kernel: LSM: Security Framework initializing Oct 11 02:44:52 localhost kernel: Yama: becoming mindful. Oct 11 02:44:52 localhost kernel: SELinux: Initializing. Oct 11 02:44:52 localhost kernel: LSM support for eBPF active Oct 11 02:44:52 localhost kernel: Mount-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 11 02:44:52 localhost kernel: Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 11 02:44:52 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Oct 11 02:44:52 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Oct 11 02:44:52 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Oct 11 02:44:52 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 11 02:44:52 localhost kernel: Spectre V2 : Mitigation: Retpolines Oct 11 02:44:52 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 11 02:44:52 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 11 02:44:52 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Oct 11 02:44:52 localhost kernel: RETBleed: Mitigation: untrained return thunk Oct 11 02:44:52 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 11 02:44:52 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Oct 11 02:44:52 localhost kernel: Freeing SMP alternatives memory: 36K Oct 11 02:44:52 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Oct 11 02:44:52 localhost kernel: cblist_init_generic: Setting adjustable number of callback queues. Oct 11 02:44:52 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Oct 11 02:44:52 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Oct 11 02:44:52 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Oct 11 02:44:52 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Oct 11 02:44:52 localhost kernel: ... version: 0 Oct 11 02:44:52 localhost kernel: ... bit width: 48 Oct 11 02:44:52 localhost kernel: ... generic registers: 6 Oct 11 02:44:52 localhost kernel: ... value mask: 0000ffffffffffff Oct 11 02:44:52 localhost kernel: ... max period: 00007fffffffffff Oct 11 02:44:52 localhost kernel: ... fixed-purpose events: 0 Oct 11 02:44:52 localhost kernel: ... event mask: 000000000000003f Oct 11 02:44:52 localhost kernel: rcu: Hierarchical SRCU implementation. Oct 11 02:44:52 localhost kernel: rcu: #011Max phase no-delay instances is 400. Oct 11 02:44:52 localhost kernel: smp: Bringing up secondary CPUs ... Oct 11 02:44:52 localhost kernel: x86: Booting SMP configuration: Oct 11 02:44:52 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Oct 11 02:44:52 localhost kernel: smp: Brought up 1 node, 8 CPUs Oct 11 02:44:52 localhost kernel: smpboot: Max logical packages: 8 Oct 11 02:44:52 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Oct 11 02:44:52 localhost kernel: node 0 deferred pages initialised in 21ms Oct 11 02:44:52 localhost kernel: devtmpfs: initialized Oct 11 02:44:52 localhost kernel: x86/mm: Memory block size: 128MB Oct 11 02:44:52 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 11 02:44:52 localhost kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Oct 11 02:44:52 localhost kernel: pinctrl core: initialized pinctrl subsystem Oct 11 02:44:52 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 11 02:44:52 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL pool for atomic allocations Oct 11 02:44:52 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Oct 11 02:44:52 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Oct 11 02:44:52 localhost kernel: audit: initializing netlink subsys (disabled) Oct 11 02:44:52 localhost kernel: audit: type=2000 audit(1760165090.476:1): state=initialized audit_enabled=0 res=1 Oct 11 02:44:52 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Oct 11 02:44:52 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 11 02:44:52 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Oct 11 02:44:52 localhost kernel: cpuidle: using governor menu Oct 11 02:44:52 localhost kernel: HugeTLB: can optimize 4095 vmemmap pages for hugepages-1048576kB Oct 11 02:44:52 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 11 02:44:52 localhost kernel: PCI: Using configuration type 1 for base access Oct 11 02:44:52 localhost kernel: PCI: Using configuration type 1 for extended access Oct 11 02:44:52 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 11 02:44:52 localhost kernel: HugeTLB: can optimize 7 vmemmap pages for hugepages-2048kB Oct 11 02:44:52 localhost kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 11 02:44:52 localhost kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 11 02:44:52 localhost kernel: cryptd: max_cpu_qlen set to 1000 Oct 11 02:44:52 localhost kernel: ACPI: Added _OSI(Module Device) Oct 11 02:44:52 localhost kernel: ACPI: Added _OSI(Processor Device) Oct 11 02:44:52 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 11 02:44:52 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 11 02:44:52 localhost kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 11 02:44:52 localhost kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 11 02:44:52 localhost kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 11 02:44:52 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 11 02:44:52 localhost kernel: ACPI: Interpreter enabled Oct 11 02:44:52 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Oct 11 02:44:52 localhost kernel: ACPI: Using IOAPIC for interrupt routing Oct 11 02:44:52 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 11 02:44:52 localhost kernel: PCI: Using E820 reservations for host bridge windows Oct 11 02:44:52 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Oct 11 02:44:52 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 11 02:44:52 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Oct 11 02:44:52 localhost kernel: acpiphp: Slot [3] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [4] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [5] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [6] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [7] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [8] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [9] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [10] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [11] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [12] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [13] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [14] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [15] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [16] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [17] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [18] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [19] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [20] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [21] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [22] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [23] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [24] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [25] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [26] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [27] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [28] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [29] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [30] registered Oct 11 02:44:52 localhost kernel: acpiphp: Slot [31] registered Oct 11 02:44:52 localhost kernel: PCI host bridge to bus 0000:00 Oct 11 02:44:52 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 11 02:44:52 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 11 02:44:52 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 11 02:44:52 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 11 02:44:52 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x440000000-0x4bfffffff window] Oct 11 02:44:52 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 11 02:44:52 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Oct 11 02:44:52 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Oct 11 02:44:52 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Oct 11 02:44:52 localhost kernel: pci 0000:00:01.1: reg 0x20: [io 0xc140-0xc14f] Oct 11 02:44:52 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Oct 11 02:44:52 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Oct 11 02:44:52 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Oct 11 02:44:52 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Oct 11 02:44:52 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Oct 11 02:44:52 localhost kernel: pci 0000:00:01.2: reg 0x20: [io 0xc100-0xc11f] Oct 11 02:44:52 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Oct 11 02:44:52 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Oct 11 02:44:52 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Oct 11 02:44:52 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Oct 11 02:44:52 localhost kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Oct 11 02:44:52 localhost kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Oct 11 02:44:52 localhost kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Oct 11 02:44:52 localhost kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Oct 11 02:44:52 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 11 02:44:52 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Oct 11 02:44:52 localhost kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Oct 11 02:44:52 localhost kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Oct 11 02:44:52 localhost kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Oct 11 02:44:52 localhost kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Oct 11 02:44:52 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Oct 11 02:44:52 localhost kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Oct 11 02:44:52 localhost kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Oct 11 02:44:52 localhost kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Oct 11 02:44:52 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Oct 11 02:44:52 localhost kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Oct 11 02:44:52 localhost kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Oct 11 02:44:52 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Oct 11 02:44:52 localhost kernel: pci 0000:00:06.0: reg 0x10: [io 0xc120-0xc13f] Oct 11 02:44:52 localhost kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Oct 11 02:44:52 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 11 02:44:52 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 11 02:44:52 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 11 02:44:52 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 11 02:44:52 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 11 02:44:52 localhost kernel: iommu: Default domain type: Translated Oct 11 02:44:52 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 11 02:44:52 localhost kernel: SCSI subsystem initialized Oct 11 02:44:52 localhost kernel: ACPI: bus type USB registered Oct 11 02:44:52 localhost kernel: usbcore: registered new interface driver usbfs Oct 11 02:44:52 localhost kernel: usbcore: registered new interface driver hub Oct 11 02:44:52 localhost kernel: usbcore: registered new device driver usb Oct 11 02:44:52 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Oct 11 02:44:52 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 11 02:44:52 localhost kernel: PTP clock support registered Oct 11 02:44:52 localhost kernel: EDAC MC: Ver: 3.0.0 Oct 11 02:44:52 localhost kernel: NetLabel: Initializing Oct 11 02:44:52 localhost kernel: NetLabel: domain hash size = 128 Oct 11 02:44:52 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Oct 11 02:44:52 localhost kernel: NetLabel: unlabeled traffic allowed by default Oct 11 02:44:52 localhost kernel: PCI: Using ACPI for IRQ routing Oct 11 02:44:52 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Oct 11 02:44:52 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Oct 11 02:44:52 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 11 02:44:52 localhost kernel: vgaarb: loaded Oct 11 02:44:52 localhost kernel: clocksource: Switched to clocksource kvm-clock Oct 11 02:44:52 localhost kernel: VFS: Disk quotas dquot_6.6.0 Oct 11 02:44:52 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 11 02:44:52 localhost kernel: pnp: PnP ACPI init Oct 11 02:44:52 localhost kernel: pnp: PnP ACPI: found 5 devices Oct 11 02:44:52 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 11 02:44:52 localhost kernel: NET: Registered PF_INET protocol family Oct 11 02:44:52 localhost kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 11 02:44:52 localhost kernel: tcp_listen_portaddr_hash hash table entries: 8192 (order: 5, 131072 bytes, linear) Oct 11 02:44:52 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 11 02:44:52 localhost kernel: TCP established hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 11 02:44:52 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Oct 11 02:44:52 localhost kernel: TCP: Hash tables configured (established 131072 bind 65536) Oct 11 02:44:52 localhost kernel: MPTCP token hash table entries: 16384 (order: 6, 393216 bytes, linear) Oct 11 02:44:52 localhost kernel: UDP hash table entries: 8192 (order: 6, 262144 bytes, linear) Oct 11 02:44:52 localhost kernel: UDP-Lite hash table entries: 8192 (order: 6, 262144 bytes, linear) Oct 11 02:44:52 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 11 02:44:52 localhost kernel: NET: Registered PF_XDP protocol family Oct 11 02:44:52 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 11 02:44:52 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 11 02:44:52 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 11 02:44:52 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Oct 11 02:44:52 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x440000000-0x4bfffffff window] Oct 11 02:44:52 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Oct 11 02:44:52 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 11 02:44:52 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Oct 11 02:44:52 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x140 took 27503 usecs Oct 11 02:44:52 localhost kernel: PCI: CLS 0 bytes, default 64 Oct 11 02:44:52 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 11 02:44:52 localhost kernel: Trying to unpack rootfs image as initramfs... Oct 11 02:44:52 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Oct 11 02:44:52 localhost kernel: ACPI: bus type thunderbolt registered Oct 11 02:44:52 localhost kernel: Initialise system trusted keyrings Oct 11 02:44:52 localhost kernel: Key type blacklist registered Oct 11 02:44:52 localhost kernel: workingset: timestamp_bits=36 max_order=22 bucket_order=0 Oct 11 02:44:52 localhost kernel: zbud: loaded Oct 11 02:44:52 localhost kernel: integrity: Platform Keyring initialized Oct 11 02:44:52 localhost kernel: NET: Registered PF_ALG protocol family Oct 11 02:44:52 localhost kernel: xor: automatically using best checksumming function avx Oct 11 02:44:52 localhost kernel: Key type asymmetric registered Oct 11 02:44:52 localhost kernel: Asymmetric key parser 'x509' registered Oct 11 02:44:52 localhost kernel: Running certificate verification selftests Oct 11 02:44:52 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Oct 11 02:44:52 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Oct 11 02:44:52 localhost kernel: io scheduler mq-deadline registered Oct 11 02:44:52 localhost kernel: io scheduler kyber registered Oct 11 02:44:52 localhost kernel: io scheduler bfq registered Oct 11 02:44:52 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Oct 11 02:44:52 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Oct 11 02:44:52 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Oct 11 02:44:52 localhost kernel: ACPI: button: Power Button [PWRF] Oct 11 02:44:52 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Oct 11 02:44:52 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Oct 11 02:44:52 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Oct 11 02:44:52 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 11 02:44:52 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 11 02:44:52 localhost kernel: Non-volatile memory driver v1.3 Oct 11 02:44:52 localhost kernel: rdac: device handler registered Oct 11 02:44:52 localhost kernel: hp_sw: device handler registered Oct 11 02:44:52 localhost kernel: emc: device handler registered Oct 11 02:44:52 localhost kernel: alua: device handler registered Oct 11 02:44:52 localhost kernel: libphy: Fixed MDIO Bus: probed Oct 11 02:44:52 localhost kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Oct 11 02:44:52 localhost kernel: ehci-pci: EHCI PCI platform driver Oct 11 02:44:52 localhost kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver Oct 11 02:44:52 localhost kernel: ohci-pci: OHCI PCI platform driver Oct 11 02:44:52 localhost kernel: uhci_hcd: USB Universal Host Controller Interface driver Oct 11 02:44:52 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Oct 11 02:44:52 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Oct 11 02:44:52 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Oct 11 02:44:52 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Oct 11 02:44:52 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Oct 11 02:44:52 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Oct 11 02:44:52 localhost kernel: usb usb1: Product: UHCI Host Controller Oct 11 02:44:52 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-284.11.1.el9_2.x86_64 uhci_hcd Oct 11 02:44:52 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Oct 11 02:44:52 localhost kernel: hub 1-0:1.0: USB hub found Oct 11 02:44:52 localhost kernel: hub 1-0:1.0: 2 ports detected Oct 11 02:44:52 localhost kernel: usbcore: registered new interface driver usbserial_generic Oct 11 02:44:52 localhost kernel: usbserial: USB Serial support registered for generic Oct 11 02:44:52 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 11 02:44:52 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 11 02:44:52 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 11 02:44:52 localhost kernel: mousedev: PS/2 mouse device common for all mice Oct 11 02:44:52 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Oct 11 02:44:52 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Oct 11 02:44:52 localhost kernel: rtc_cmos 00:04: registered as rtc0 Oct 11 02:44:52 localhost kernel: rtc_cmos 00:04: setting system clock to 2025-10-11T06:44:51 UTC (1760165091) Oct 11 02:44:52 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Oct 11 02:44:52 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Oct 11 02:44:52 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Oct 11 02:44:52 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Oct 11 02:44:52 localhost kernel: usbcore: registered new interface driver usbhid Oct 11 02:44:52 localhost kernel: usbhid: USB HID core driver Oct 11 02:44:52 localhost kernel: drop_monitor: Initializing network drop monitor service Oct 11 02:44:52 localhost kernel: Initializing XFRM netlink socket Oct 11 02:44:52 localhost kernel: NET: Registered PF_INET6 protocol family Oct 11 02:44:52 localhost kernel: Segment Routing with IPv6 Oct 11 02:44:52 localhost kernel: NET: Registered PF_PACKET protocol family Oct 11 02:44:52 localhost kernel: mpls_gso: MPLS GSO support Oct 11 02:44:52 localhost kernel: IPI shorthand broadcast: enabled Oct 11 02:44:52 localhost kernel: AVX2 version of gcm_enc/dec engaged. Oct 11 02:44:52 localhost kernel: AES CTR mode by8 optimization enabled Oct 11 02:44:52 localhost kernel: sched_clock: Marking stable (768282939, 180956244)->(1091852450, -142613267) Oct 11 02:44:52 localhost kernel: registered taskstats version 1 Oct 11 02:44:52 localhost kernel: Loading compiled-in X.509 certificates Oct 11 02:44:52 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Oct 11 02:44:52 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Oct 11 02:44:52 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Oct 11 02:44:52 localhost kernel: zswap: loaded using pool lzo/zbud Oct 11 02:44:52 localhost kernel: page_owner is disabled Oct 11 02:44:52 localhost kernel: Key type big_key registered Oct 11 02:44:52 localhost kernel: Freeing initrd memory: 74232K Oct 11 02:44:52 localhost kernel: Key type encrypted registered Oct 11 02:44:52 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Oct 11 02:44:52 localhost kernel: Loading compiled-in module X.509 certificates Oct 11 02:44:52 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Oct 11 02:44:52 localhost kernel: ima: Allocated hash algorithm: sha256 Oct 11 02:44:52 localhost kernel: ima: No architecture policies found Oct 11 02:44:52 localhost kernel: evm: Initialising EVM extended attributes: Oct 11 02:44:52 localhost kernel: evm: security.selinux Oct 11 02:44:52 localhost kernel: evm: security.SMACK64 (disabled) Oct 11 02:44:52 localhost kernel: evm: security.SMACK64EXEC (disabled) Oct 11 02:44:52 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Oct 11 02:44:52 localhost kernel: evm: security.SMACK64MMAP (disabled) Oct 11 02:44:52 localhost kernel: evm: security.apparmor (disabled) Oct 11 02:44:52 localhost kernel: evm: security.ima Oct 11 02:44:52 localhost kernel: evm: security.capability Oct 11 02:44:52 localhost kernel: evm: HMAC attrs: 0x1 Oct 11 02:44:52 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Oct 11 02:44:52 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Oct 11 02:44:52 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Oct 11 02:44:52 localhost kernel: usb 1-1: Product: QEMU USB Tablet Oct 11 02:44:52 localhost kernel: usb 1-1: Manufacturer: QEMU Oct 11 02:44:52 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Oct 11 02:44:52 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Oct 11 02:44:52 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Oct 11 02:44:52 localhost kernel: Freeing unused decrypted memory: 2036K Oct 11 02:44:52 localhost kernel: Freeing unused kernel image (initmem) memory: 2792K Oct 11 02:44:52 localhost kernel: Write protecting the kernel read-only data: 26624k Oct 11 02:44:52 localhost kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 11 02:44:52 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 60K Oct 11 02:44:52 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Oct 11 02:44:52 localhost kernel: Run /init as init process Oct 11 02:44:52 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 11 02:44:52 localhost systemd[1]: Detected virtualization kvm. Oct 11 02:44:52 localhost systemd[1]: Detected architecture x86-64. Oct 11 02:44:52 localhost systemd[1]: Running in initrd. Oct 11 02:44:52 localhost systemd[1]: No hostname configured, using default hostname. Oct 11 02:44:52 localhost systemd[1]: Hostname set to . Oct 11 02:44:52 localhost systemd[1]: Initializing machine ID from VM UUID. Oct 11 02:44:52 localhost systemd[1]: Queued start job for default target Initrd Default Target. Oct 11 02:44:52 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Oct 11 02:44:52 localhost systemd[1]: Reached target Local Encrypted Volumes. Oct 11 02:44:52 localhost systemd[1]: Reached target Initrd /usr File System. Oct 11 02:44:52 localhost systemd[1]: Reached target Local File Systems. Oct 11 02:44:52 localhost systemd[1]: Reached target Path Units. Oct 11 02:44:52 localhost systemd[1]: Reached target Slice Units. Oct 11 02:44:52 localhost systemd[1]: Reached target Swaps. Oct 11 02:44:52 localhost systemd[1]: Reached target Timer Units. Oct 11 02:44:52 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Oct 11 02:44:52 localhost systemd[1]: Listening on Journal Socket (/dev/log). Oct 11 02:44:52 localhost systemd[1]: Listening on Journal Socket. Oct 11 02:44:52 localhost systemd[1]: Listening on udev Control Socket. Oct 11 02:44:52 localhost systemd[1]: Listening on udev Kernel Socket. Oct 11 02:44:52 localhost systemd[1]: Reached target Socket Units. Oct 11 02:44:52 localhost systemd[1]: Starting Create List of Static Device Nodes... Oct 11 02:44:52 localhost systemd[1]: Starting Journal Service... Oct 11 02:44:52 localhost systemd[1]: Starting Load Kernel Modules... Oct 11 02:44:52 localhost systemd[1]: Starting Create System Users... Oct 11 02:44:52 localhost systemd[1]: Starting Setup Virtual Console... Oct 11 02:44:52 localhost systemd[1]: Finished Create List of Static Device Nodes. Oct 11 02:44:52 localhost systemd[1]: Finished Load Kernel Modules. Oct 11 02:44:52 localhost systemd[1]: Starting Apply Kernel Variables... Oct 11 02:44:52 localhost systemd-journald[283]: Journal started Oct 11 02:44:52 localhost systemd-journald[283]: Runtime Journal (/run/log/journal/9dc5d201592f43de9d252012fe3474fa) is 8.0M, max 314.7M, 306.7M free. Oct 11 02:44:52 localhost systemd-modules-load[284]: Module 'msr' is built in Oct 11 02:44:52 localhost systemd[1]: Started Journal Service. Oct 11 02:44:52 localhost systemd[1]: Finished Setup Virtual Console. Oct 11 02:44:52 localhost systemd[1]: Finished Apply Kernel Variables. Oct 11 02:44:52 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Oct 11 02:44:52 localhost systemd[1]: Starting dracut cmdline hook... Oct 11 02:44:52 localhost systemd-sysusers[285]: Creating group 'sgx' with GID 997. Oct 11 02:44:52 localhost systemd-sysusers[285]: Creating group 'users' with GID 100. Oct 11 02:44:52 localhost systemd-sysusers[285]: Creating group 'dbus' with GID 81. Oct 11 02:44:52 localhost systemd-sysusers[285]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Oct 11 02:44:52 localhost systemd[1]: Finished Create System Users. Oct 11 02:44:52 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Oct 11 02:44:52 localhost systemd[1]: Starting Create Volatile Files and Directories... Oct 11 02:44:52 localhost dracut-cmdline[290]: dracut-9.2 (Plow) dracut-057-21.git20230214.el9 Oct 11 02:44:52 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Oct 11 02:44:52 localhost dracut-cmdline[290]: Using kernel command line parameters: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Oct 11 02:44:52 localhost systemd[1]: Finished Create Volatile Files and Directories. Oct 11 02:44:52 localhost systemd[1]: Finished dracut cmdline hook. Oct 11 02:44:52 localhost systemd[1]: Starting dracut pre-udev hook... Oct 11 02:44:52 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 11 02:44:52 localhost kernel: device-mapper: uevent: version 1.0.3 Oct 11 02:44:52 localhost kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Oct 11 02:44:52 localhost kernel: RPC: Registered named UNIX socket transport module. Oct 11 02:44:52 localhost kernel: RPC: Registered udp transport module. Oct 11 02:44:52 localhost kernel: RPC: Registered tcp transport module. Oct 11 02:44:52 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Oct 11 02:44:52 localhost rpc.statd[405]: Version 2.5.4 starting Oct 11 02:44:52 localhost rpc.statd[405]: Initializing NSM state Oct 11 02:44:52 localhost rpc.idmapd[410]: Setting log level to 0 Oct 11 02:44:52 localhost systemd[1]: Finished dracut pre-udev hook. Oct 11 02:44:52 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Oct 11 02:44:52 localhost systemd-udevd[423]: Using default interface naming scheme 'rhel-9.0'. Oct 11 02:44:52 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Oct 11 02:44:52 localhost systemd[1]: Starting dracut pre-trigger hook... Oct 11 02:44:52 localhost systemd[1]: Finished dracut pre-trigger hook. Oct 11 02:44:52 localhost systemd[1]: Starting Coldplug All udev Devices... Oct 11 02:44:52 localhost systemd[1]: Finished Coldplug All udev Devices. Oct 11 02:44:52 localhost systemd[1]: Reached target System Initialization. Oct 11 02:44:52 localhost systemd[1]: Reached target Basic System. Oct 11 02:44:52 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Oct 11 02:44:52 localhost systemd[1]: Reached target Network. Oct 11 02:44:52 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Oct 11 02:44:52 localhost systemd[1]: Starting dracut initqueue hook... Oct 11 02:44:52 localhost kernel: virtio_blk virtio2: [vda] 838860800 512-byte logical blocks (429 GB/400 GiB) Oct 11 02:44:52 localhost kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 11 02:44:52 localhost kernel: GPT:20971519 != 838860799 Oct 11 02:44:52 localhost kernel: GPT:Alternate GPT header not at the end of the disk. Oct 11 02:44:52 localhost kernel: GPT:20971519 != 838860799 Oct 11 02:44:52 localhost kernel: GPT: Use GNU Parted to correct GPT errors. Oct 11 02:44:52 localhost kernel: vda: vda1 vda2 vda3 vda4 Oct 11 02:44:52 localhost kernel: scsi host0: ata_piix Oct 11 02:44:52 localhost kernel: scsi host1: ata_piix Oct 11 02:44:52 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 Oct 11 02:44:52 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 Oct 11 02:44:52 localhost systemd-udevd[425]: Network interface NamePolicy= disabled on kernel command line. Oct 11 02:44:52 localhost systemd[1]: Found device /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Oct 11 02:44:52 localhost systemd[1]: Reached target Initrd Root Device. Oct 11 02:44:52 localhost kernel: ata1: found unknown device (class 0) Oct 11 02:44:52 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Oct 11 02:44:52 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Oct 11 02:44:53 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Oct 11 02:44:53 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Oct 11 02:44:53 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 11 02:44:53 localhost systemd[1]: Finished dracut initqueue hook. Oct 11 02:44:53 localhost systemd[1]: Reached target Preparation for Remote File Systems. Oct 11 02:44:53 localhost systemd[1]: Reached target Remote Encrypted Volumes. Oct 11 02:44:53 localhost systemd[1]: Reached target Remote File Systems. Oct 11 02:44:53 localhost systemd[1]: Starting dracut pre-mount hook... Oct 11 02:44:53 localhost systemd[1]: Finished dracut pre-mount hook. Oct 11 02:44:53 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a... Oct 11 02:44:53 localhost systemd-fsck[510]: /usr/sbin/fsck.xfs: XFS file system. Oct 11 02:44:53 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Oct 11 02:44:53 localhost systemd[1]: Mounting /sysroot... Oct 11 02:44:53 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Oct 11 02:44:53 localhost kernel: XFS (vda4): Mounting V5 Filesystem Oct 11 02:44:53 localhost kernel: XFS (vda4): Ending clean mount Oct 11 02:44:53 localhost systemd[1]: Mounted /sysroot. Oct 11 02:44:53 localhost systemd[1]: Reached target Initrd Root File System. Oct 11 02:44:53 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Oct 11 02:44:53 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Oct 11 02:44:53 localhost systemd[1]: Reached target Initrd File Systems. Oct 11 02:44:53 localhost systemd[1]: Reached target Initrd Default Target. Oct 11 02:44:53 localhost systemd[1]: Starting dracut mount hook... Oct 11 02:44:53 localhost systemd[1]: Finished dracut mount hook. Oct 11 02:44:53 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Oct 11 02:44:53 localhost rpc.idmapd[410]: exiting on signal 15 Oct 11 02:44:53 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Oct 11 02:44:53 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Oct 11 02:44:53 localhost systemd[1]: Stopped target Network. Oct 11 02:44:53 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Oct 11 02:44:53 localhost systemd[1]: Stopped target Timer Units. Oct 11 02:44:53 localhost systemd[1]: dbus.socket: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Oct 11 02:44:53 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Oct 11 02:44:53 localhost systemd[1]: Stopped target Initrd Default Target. Oct 11 02:44:53 localhost systemd[1]: Stopped target Basic System. Oct 11 02:44:53 localhost systemd[1]: Stopped target Initrd Root Device. Oct 11 02:44:53 localhost systemd[1]: Stopped target Initrd /usr File System. Oct 11 02:44:53 localhost systemd[1]: Stopped target Path Units. Oct 11 02:44:53 localhost systemd[1]: Stopped target Remote File Systems. Oct 11 02:44:53 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Oct 11 02:44:53 localhost systemd[1]: Stopped target Slice Units. Oct 11 02:44:53 localhost systemd[1]: Stopped target Socket Units. Oct 11 02:44:53 localhost systemd[1]: Stopped target System Initialization. Oct 11 02:44:53 localhost systemd[1]: Stopped target Local File Systems. Oct 11 02:44:53 localhost systemd[1]: Stopped target Swaps. Oct 11 02:44:53 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Stopped dracut mount hook. Oct 11 02:44:53 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Stopped dracut pre-mount hook. Oct 11 02:44:53 localhost systemd[1]: Stopped target Local Encrypted Volumes. Oct 11 02:44:53 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Oct 11 02:44:53 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Stopped dracut initqueue hook. Oct 11 02:44:53 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Stopped Apply Kernel Variables. Oct 11 02:44:53 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Stopped Load Kernel Modules. Oct 11 02:44:53 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Stopped Create Volatile Files and Directories. Oct 11 02:44:53 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Stopped Coldplug All udev Devices. Oct 11 02:44:53 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Stopped dracut pre-trigger hook. Oct 11 02:44:53 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Oct 11 02:44:53 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Stopped Setup Virtual Console. Oct 11 02:44:53 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Oct 11 02:44:53 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Closed udev Control Socket. Oct 11 02:44:53 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Closed udev Kernel Socket. Oct 11 02:44:53 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Stopped dracut pre-udev hook. Oct 11 02:44:53 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Stopped dracut cmdline hook. Oct 11 02:44:53 localhost systemd[1]: Starting Cleanup udev Database... Oct 11 02:44:53 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Oct 11 02:44:53 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Stopped Create List of Static Device Nodes. Oct 11 02:44:53 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Stopped Create System Users. Oct 11 02:44:53 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Oct 11 02:44:53 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Finished Cleanup udev Database. Oct 11 02:44:53 localhost systemd[1]: Reached target Switch Root. Oct 11 02:44:53 localhost systemd[1]: Starting Switch Root... Oct 11 02:44:53 localhost systemd[1]: Switching root. Oct 11 02:44:53 localhost systemd-journald[283]: Journal stopped Oct 11 02:44:54 localhost systemd-journald[283]: Received SIGTERM from PID 1 (systemd). Oct 11 02:44:54 localhost kernel: audit: type=1404 audit(1760165094.002:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Oct 11 02:44:54 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 02:44:54 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 02:44:54 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 02:44:54 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 02:44:54 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 02:44:54 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 02:44:54 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 02:44:54 localhost kernel: audit: type=1403 audit(1760165094.124:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 11 02:44:54 localhost systemd[1]: Successfully loaded SELinux policy in 128.876ms. Oct 11 02:44:54 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 34.753ms. Oct 11 02:44:54 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 11 02:44:54 localhost systemd[1]: Detected virtualization kvm. Oct 11 02:44:54 localhost systemd[1]: Detected architecture x86-64. Oct 11 02:44:54 localhost systemd-rc-local-generator[581]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 02:44:54 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 02:44:54 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 11 02:44:54 localhost systemd[1]: Stopped Switch Root. Oct 11 02:44:54 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 11 02:44:54 localhost systemd[1]: Created slice Slice /system/getty. Oct 11 02:44:54 localhost systemd[1]: Created slice Slice /system/modprobe. Oct 11 02:44:54 localhost systemd[1]: Created slice Slice /system/serial-getty. Oct 11 02:44:54 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Oct 11 02:44:54 localhost systemd[1]: Created slice Slice /system/systemd-fsck. Oct 11 02:44:54 localhost systemd[1]: Created slice User and Session Slice. Oct 11 02:44:54 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Oct 11 02:44:54 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Oct 11 02:44:54 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Oct 11 02:44:54 localhost systemd[1]: Reached target Local Encrypted Volumes. Oct 11 02:44:54 localhost systemd[1]: Stopped target Switch Root. Oct 11 02:44:54 localhost systemd[1]: Stopped target Initrd File Systems. Oct 11 02:44:54 localhost systemd[1]: Stopped target Initrd Root File System. Oct 11 02:44:54 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Oct 11 02:44:54 localhost systemd[1]: Reached target Path Units. Oct 11 02:44:54 localhost systemd[1]: Reached target rpc_pipefs.target. Oct 11 02:44:54 localhost systemd[1]: Reached target Slice Units. Oct 11 02:44:54 localhost systemd[1]: Reached target Swaps. Oct 11 02:44:54 localhost systemd[1]: Reached target Local Verity Protected Volumes. Oct 11 02:44:54 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Oct 11 02:44:54 localhost systemd[1]: Reached target RPC Port Mapper. Oct 11 02:44:54 localhost systemd[1]: Listening on Process Core Dump Socket. Oct 11 02:44:54 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Oct 11 02:44:54 localhost systemd[1]: Listening on udev Control Socket. Oct 11 02:44:54 localhost systemd[1]: Listening on udev Kernel Socket. Oct 11 02:44:54 localhost systemd[1]: Mounting Huge Pages File System... Oct 11 02:44:54 localhost systemd[1]: Mounting POSIX Message Queue File System... Oct 11 02:44:54 localhost systemd[1]: Mounting Kernel Debug File System... Oct 11 02:44:54 localhost systemd[1]: Mounting Kernel Trace File System... Oct 11 02:44:54 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Oct 11 02:44:54 localhost systemd[1]: Starting Create List of Static Device Nodes... Oct 11 02:44:54 localhost systemd[1]: Starting Load Kernel Module configfs... Oct 11 02:44:54 localhost systemd[1]: Starting Load Kernel Module drm... Oct 11 02:44:54 localhost systemd[1]: Starting Load Kernel Module fuse... Oct 11 02:44:54 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Oct 11 02:44:54 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 11 02:44:54 localhost systemd[1]: Stopped File System Check on Root Device. Oct 11 02:44:54 localhost systemd[1]: Stopped Journal Service. Oct 11 02:44:54 localhost systemd[1]: Starting Journal Service... Oct 11 02:44:54 localhost systemd[1]: Starting Load Kernel Modules... Oct 11 02:44:54 localhost kernel: fuse: init (API version 7.36) Oct 11 02:44:54 localhost systemd[1]: Starting Generate network units from Kernel command line... Oct 11 02:44:54 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Oct 11 02:44:54 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Oct 11 02:44:54 localhost systemd[1]: Starting Coldplug All udev Devices... Oct 11 02:44:54 localhost systemd-journald[617]: Journal started Oct 11 02:44:54 localhost systemd-journald[617]: Runtime Journal (/run/log/journal/0d75598033f175d0e781a840bff83569) is 8.0M, max 314.7M, 306.7M free. Oct 11 02:44:54 localhost systemd[1]: Queued start job for default target Multi-User System. Oct 11 02:44:54 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Oct 11 02:44:54 localhost systemd-modules-load[618]: Module 'msr' is built in Oct 11 02:44:54 localhost systemd[1]: Started Journal Service. Oct 11 02:44:54 localhost systemd[1]: Mounted Huge Pages File System. Oct 11 02:44:54 localhost kernel: ACPI: bus type drm_connector registered Oct 11 02:44:54 localhost systemd[1]: Mounted POSIX Message Queue File System. Oct 11 02:44:54 localhost systemd[1]: Mounted Kernel Debug File System. Oct 11 02:44:54 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Oct 11 02:44:54 localhost systemd[1]: Mounted Kernel Trace File System. Oct 11 02:44:54 localhost systemd[1]: Finished Create List of Static Device Nodes. Oct 11 02:44:54 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 11 02:44:54 localhost systemd[1]: Finished Load Kernel Module configfs. Oct 11 02:44:54 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 11 02:44:54 localhost systemd[1]: Finished Load Kernel Module drm. Oct 11 02:44:54 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 11 02:44:54 localhost systemd[1]: Finished Load Kernel Module fuse. Oct 11 02:44:54 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Oct 11 02:44:54 localhost systemd[1]: Finished Load Kernel Modules. Oct 11 02:44:54 localhost systemd[1]: Finished Generate network units from Kernel command line. Oct 11 02:44:54 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Oct 11 02:44:54 localhost systemd[1]: Mounting FUSE Control File System... Oct 11 02:44:54 localhost systemd[1]: Mounting Kernel Configuration File System... Oct 11 02:44:54 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Oct 11 02:44:54 localhost systemd[1]: Starting Rebuild Hardware Database... Oct 11 02:44:54 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Oct 11 02:44:54 localhost systemd[1]: Starting Load/Save Random Seed... Oct 11 02:44:54 localhost systemd[1]: Starting Apply Kernel Variables... Oct 11 02:44:54 localhost systemd[1]: Starting Create System Users... Oct 11 02:44:54 localhost systemd-journald[617]: Runtime Journal (/run/log/journal/0d75598033f175d0e781a840bff83569) is 8.0M, max 314.7M, 306.7M free. Oct 11 02:44:54 localhost systemd-journald[617]: Received client request to flush runtime journal. Oct 11 02:44:54 localhost systemd[1]: Mounted FUSE Control File System. Oct 11 02:44:54 localhost systemd[1]: Mounted Kernel Configuration File System. Oct 11 02:44:54 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Oct 11 02:44:54 localhost systemd[1]: Finished Apply Kernel Variables. Oct 11 02:44:54 localhost systemd[1]: Finished Load/Save Random Seed. Oct 11 02:44:54 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Oct 11 02:44:54 localhost systemd-sysusers[630]: Creating group 'sgx' with GID 989. Oct 11 02:44:54 localhost systemd-sysusers[630]: Creating group 'systemd-oom' with GID 988. Oct 11 02:44:54 localhost systemd-sysusers[630]: Creating user 'systemd-oom' (systemd Userspace OOM Killer) with UID 988 and GID 988. Oct 11 02:44:54 localhost systemd[1]: Finished Coldplug All udev Devices. Oct 11 02:44:54 localhost systemd[1]: Finished Create System Users. Oct 11 02:44:54 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Oct 11 02:44:54 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Oct 11 02:44:54 localhost systemd[1]: Reached target Preparation for Local File Systems. Oct 11 02:44:54 localhost systemd[1]: Set up automount EFI System Partition Automount. Oct 11 02:44:55 localhost systemd[1]: Finished Rebuild Hardware Database. Oct 11 02:44:55 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Oct 11 02:44:55 localhost systemd-udevd[634]: Using default interface naming scheme 'rhel-9.0'. Oct 11 02:44:55 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Oct 11 02:44:55 localhost systemd[1]: Starting Load Kernel Module configfs... Oct 11 02:44:55 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 11 02:44:55 localhost systemd[1]: Finished Load Kernel Module configfs. Oct 11 02:44:55 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Oct 11 02:44:55 localhost systemd-udevd[647]: Network interface NamePolicy= disabled on kernel command line. Oct 11 02:44:55 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/b141154b-6a70-437a-a97f-d160c9ba37eb being skipped. Oct 11 02:44:55 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/7B77-95E7 being skipped. Oct 11 02:44:55 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/7B77-95E7... Oct 11 02:44:55 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Oct 11 02:44:55 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Oct 11 02:44:55 localhost systemd-fsck[679]: fsck.fat 4.2 (2021-01-31) Oct 11 02:44:55 localhost systemd-fsck[679]: /dev/vda2: 12 files, 1782/51145 clusters Oct 11 02:44:55 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/7B77-95E7. Oct 11 02:44:55 localhost kernel: SVM: TSC scaling supported Oct 11 02:44:55 localhost kernel: kvm: Nested Virtualization enabled Oct 11 02:44:55 localhost kernel: SVM: kvm: Nested Paging enabled Oct 11 02:44:55 localhost kernel: SVM: LBR virtualization supported Oct 11 02:44:55 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Oct 11 02:44:55 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Oct 11 02:44:55 localhost kernel: Console: switching to colour dummy device 80x25 Oct 11 02:44:55 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Oct 11 02:44:55 localhost kernel: [drm] features: -context_init Oct 11 02:44:55 localhost kernel: [drm] number of scanouts: 1 Oct 11 02:44:55 localhost kernel: [drm] number of cap sets: 0 Oct 11 02:44:55 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 0 for virtio0 on minor 0 Oct 11 02:44:55 localhost kernel: virtio_gpu virtio0: [drm] drm_plane_enable_fb_damage_clips() not called Oct 11 02:44:55 localhost kernel: Console: switching to colour frame buffer device 128x48 Oct 11 02:44:55 localhost kernel: virtio_gpu virtio0: [drm] fb0: virtio_gpudrmfb frame buffer device Oct 11 02:44:55 localhost systemd[1]: Mounting /boot... Oct 11 02:44:55 localhost kernel: XFS (vda3): Mounting V5 Filesystem Oct 11 02:44:55 localhost kernel: XFS (vda3): Ending clean mount Oct 11 02:44:55 localhost kernel: xfs filesystem being mounted at /boot supports timestamps until 2038 (0x7fffffff) Oct 11 02:44:55 localhost systemd[1]: Mounted /boot. Oct 11 02:44:55 localhost systemd[1]: Mounting /boot/efi... Oct 11 02:44:55 localhost systemd[1]: Mounted /boot/efi. Oct 11 02:44:55 localhost systemd[1]: Reached target Local File Systems. Oct 11 02:44:55 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Oct 11 02:44:55 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Oct 11 02:44:55 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Oct 11 02:44:55 localhost systemd[1]: Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 11 02:44:55 localhost systemd[1]: Starting Automatic Boot Loader Update... Oct 11 02:44:55 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Oct 11 02:44:55 localhost systemd[1]: Starting Create Volatile Files and Directories... Oct 11 02:44:55 localhost systemd[1]: efi.automount: Got automount request for /efi, triggered by 716 (bootctl) Oct 11 02:44:55 localhost systemd[1]: Starting File System Check on /dev/vda2... Oct 11 02:44:55 localhost systemd[1]: Finished File System Check on /dev/vda2. Oct 11 02:44:55 localhost systemd[1]: Mounting EFI System Partition Automount... Oct 11 02:44:55 localhost systemd[1]: Mounted EFI System Partition Automount. Oct 11 02:44:55 localhost systemd[1]: Finished Automatic Boot Loader Update. Oct 11 02:44:56 localhost systemd[1]: Finished Create Volatile Files and Directories. Oct 11 02:44:56 localhost systemd[1]: Starting Security Auditing Service... Oct 11 02:44:56 localhost systemd[1]: Starting RPC Bind... Oct 11 02:44:56 localhost systemd[1]: Starting Rebuild Journal Catalog... Oct 11 02:44:56 localhost auditd[725]: audit dispatcher initialized with q_depth=1200 and 1 active plugins Oct 11 02:44:56 localhost auditd[725]: Init complete, auditd 3.0.7 listening for events (startup state enable) Oct 11 02:44:56 localhost systemd[1]: Finished Rebuild Journal Catalog. Oct 11 02:44:56 localhost systemd[1]: Started RPC Bind. Oct 11 02:44:56 localhost augenrules[730]: /sbin/augenrules: No change Oct 11 02:44:56 localhost augenrules[740]: No rules Oct 11 02:44:56 localhost augenrules[740]: enabled 1 Oct 11 02:44:56 localhost augenrules[740]: failure 1 Oct 11 02:44:56 localhost augenrules[740]: pid 725 Oct 11 02:44:56 localhost augenrules[740]: rate_limit 0 Oct 11 02:44:56 localhost augenrules[740]: backlog_limit 8192 Oct 11 02:44:56 localhost augenrules[740]: lost 0 Oct 11 02:44:56 localhost augenrules[740]: backlog 3 Oct 11 02:44:56 localhost augenrules[740]: backlog_wait_time 60000 Oct 11 02:44:56 localhost augenrules[740]: backlog_wait_time_actual 0 Oct 11 02:44:56 localhost augenrules[740]: enabled 1 Oct 11 02:44:56 localhost augenrules[740]: failure 1 Oct 11 02:44:56 localhost augenrules[740]: pid 725 Oct 11 02:44:56 localhost augenrules[740]: rate_limit 0 Oct 11 02:44:56 localhost augenrules[740]: backlog_limit 8192 Oct 11 02:44:56 localhost augenrules[740]: lost 0 Oct 11 02:44:56 localhost augenrules[740]: backlog 0 Oct 11 02:44:56 localhost augenrules[740]: backlog_wait_time 60000 Oct 11 02:44:56 localhost augenrules[740]: backlog_wait_time_actual 0 Oct 11 02:44:56 localhost augenrules[740]: enabled 1 Oct 11 02:44:56 localhost augenrules[740]: failure 1 Oct 11 02:44:56 localhost augenrules[740]: pid 725 Oct 11 02:44:56 localhost augenrules[740]: rate_limit 0 Oct 11 02:44:56 localhost augenrules[740]: backlog_limit 8192 Oct 11 02:44:56 localhost augenrules[740]: lost 0 Oct 11 02:44:56 localhost augenrules[740]: backlog 1 Oct 11 02:44:56 localhost augenrules[740]: backlog_wait_time 60000 Oct 11 02:44:56 localhost augenrules[740]: backlog_wait_time_actual 0 Oct 11 02:44:56 localhost systemd[1]: Started Security Auditing Service. Oct 11 02:44:56 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Oct 11 02:44:56 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Oct 11 02:44:56 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Oct 11 02:44:56 localhost systemd[1]: Starting Update is Completed... Oct 11 02:44:56 localhost systemd[1]: Finished Update is Completed. Oct 11 02:44:56 localhost systemd[1]: Reached target System Initialization. Oct 11 02:44:56 localhost systemd[1]: Started dnf makecache --timer. Oct 11 02:44:56 localhost systemd[1]: Started Daily rotation of log files. Oct 11 02:44:56 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Oct 11 02:44:56 localhost systemd[1]: Reached target Timer Units. Oct 11 02:44:56 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Oct 11 02:44:56 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Oct 11 02:44:56 localhost systemd[1]: Reached target Socket Units. Oct 11 02:44:56 localhost systemd[1]: Starting Initial cloud-init job (pre-networking)... Oct 11 02:44:56 localhost systemd[1]: Starting D-Bus System Message Bus... Oct 11 02:44:56 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 11 02:44:56 localhost systemd[1]: Started D-Bus System Message Bus. Oct 11 02:44:56 localhost systemd[1]: Reached target Basic System. Oct 11 02:44:56 localhost journal[750]: Ready Oct 11 02:44:56 localhost systemd[1]: Starting NTP client/server... Oct 11 02:44:56 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Oct 11 02:44:56 localhost systemd[1]: Started irqbalance daemon. Oct 11 02:44:56 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Oct 11 02:44:56 localhost systemd[1]: Starting System Logging Service... Oct 11 02:44:56 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 02:44:56 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 02:44:56 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 02:44:56 localhost systemd[1]: Reached target sshd-keygen.target. Oct 11 02:44:56 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Oct 11 02:44:56 localhost systemd[1]: Reached target User and Group Name Lookups. Oct 11 02:44:56 localhost systemd[1]: Starting User Login Management... Oct 11 02:44:56 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Oct 11 02:44:56 localhost systemd[1]: Started System Logging Service. Oct 11 02:44:56 localhost rsyslogd[758]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="758" x-info="https://www.rsyslog.com"] start Oct 11 02:44:56 localhost rsyslogd[758]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2040 ] Oct 11 02:44:56 localhost chronyd[765]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Oct 11 02:44:56 localhost chronyd[765]: Using right/UTC timezone to obtain leap second data Oct 11 02:44:56 localhost chronyd[765]: Loaded seccomp filter (level 2) Oct 11 02:44:56 localhost systemd[1]: Started NTP client/server. Oct 11 02:44:56 localhost systemd-logind[759]: New seat seat0. Oct 11 02:44:56 localhost systemd-logind[759]: Watching system buttons on /dev/input/event0 (Power Button) Oct 11 02:44:56 localhost systemd-logind[759]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Oct 11 02:44:56 localhost systemd[1]: Started User Login Management. Oct 11 02:44:56 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 02:44:56 localhost cloud-init[769]: Cloud-init v. 22.1-9.el9 running 'init-local' at Sat, 11 Oct 2025 06:44:56 +0000. Up 6.17 seconds. Oct 11 02:44:57 localhost systemd[1]: run-cloud\x2dinit-tmp-tmp6r34qsep.mount: Deactivated successfully. Oct 11 02:44:57 localhost systemd[1]: Starting Hostname Service... Oct 11 02:44:57 localhost systemd[1]: Started Hostname Service. Oct 11 02:44:57 localhost systemd-hostnamed[783]: Hostname set to (static) Oct 11 02:44:57 localhost systemd[1]: Finished Initial cloud-init job (pre-networking). Oct 11 02:44:57 localhost systemd[1]: Reached target Preparation for Network. Oct 11 02:44:57 localhost systemd[1]: Starting Network Manager... Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.5675] NetworkManager (version 1.42.2-1.el9) is starting... (boot:4d4ae53b-6f0f-4aff-917f-c980fa015082) Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.5681] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Oct 11 02:44:57 localhost systemd[1]: Started Network Manager. Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.5740] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Oct 11 02:44:57 localhost systemd[1]: Reached target Network. Oct 11 02:44:57 localhost systemd[1]: Starting Network Manager Wait Online... Oct 11 02:44:57 localhost systemd[1]: Starting GSSAPI Proxy Daemon... Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.5855] manager[0x55a2b7e8b020]: monitoring kernel firmware directory '/lib/firmware'. Oct 11 02:44:57 localhost systemd[1]: Starting Enable periodic update of entitlement certificates.... Oct 11 02:44:57 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.5955] hostname: hostname: using hostnamed Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.5956] hostname: static hostname changed from (none) to "np0005481012.novalocal" Oct 11 02:44:57 localhost systemd[1]: Started Enable periodic update of entitlement certificates.. Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.5967] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Oct 11 02:44:57 localhost systemd[1]: Started GSSAPI Proxy Daemon. Oct 11 02:44:57 localhost systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Oct 11 02:44:57 localhost systemd[1]: Reached target NFS client services. Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6084] manager[0x55a2b7e8b020]: rfkill: Wi-Fi hardware radio set enabled Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6085] manager[0x55a2b7e8b020]: rfkill: WWAN hardware radio set enabled Oct 11 02:44:57 localhost systemd[1]: Reached target Preparation for Remote File Systems. Oct 11 02:44:57 localhost systemd[1]: Reached target Remote File Systems. Oct 11 02:44:57 localhost systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6151] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6152] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6160] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6161] manager: Networking is enabled by state file Oct 11 02:44:57 localhost systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6214] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6215] settings: Loaded settings plugin: keyfile (internal) Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6246] dhcp: init: Using DHCP client 'internal' Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6249] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Oct 11 02:44:57 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6261] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6267] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6274] device (lo): Activation: starting connection 'lo' (c80c538d-37ce-46b8-a8de-03e67e0c9a1d) Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6281] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6283] device (eth0): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6311] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6313] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6314] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6316] device (eth0): carrier: link connected Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6317] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6321] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6325] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6329] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6343] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6345] manager: NetworkManager state is now CONNECTING Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6346] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6354] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6356] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Oct 11 02:44:57 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6390] dhcp4 (eth0): state changed new lease, address=38.102.83.145 Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6394] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6417] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed') Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6422] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6424] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6429] device (lo): Activation: successful, device activated. Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6448] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed') Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6451] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed') Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6455] manager: NetworkManager state is now CONNECTED_SITE Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6457] device (eth0): Activation: successful, device activated. Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6462] manager: NetworkManager state is now CONNECTED_GLOBAL Oct 11 02:44:57 localhost NetworkManager[788]: [1760165097.6467] manager: startup complete Oct 11 02:44:57 localhost systemd[1]: Finished Network Manager Wait Online. Oct 11 02:44:57 localhost systemd[1]: Starting Initial cloud-init job (metadata service crawler)... Oct 11 02:44:57 localhost cloud-init[917]: Cloud-init v. 22.1-9.el9 running 'init' at Sat, 11 Oct 2025 06:44:57 +0000. Up 7.09 seconds. Oct 11 02:44:57 localhost cloud-init[917]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Oct 11 02:44:57 localhost cloud-init[917]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Oct 11 02:44:57 localhost cloud-init[917]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Oct 11 02:44:57 localhost cloud-init[917]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Oct 11 02:44:57 localhost cloud-init[917]: ci-info: | eth0 | True | 38.102.83.145 | 255.255.255.0 | global | fa:16:3e:2b:a5:c8 | Oct 11 02:44:57 localhost cloud-init[917]: ci-info: | eth0 | True | fe80::f816:3eff:fe2b:a5c8/64 | . | link | fa:16:3e:2b:a5:c8 | Oct 11 02:44:57 localhost cloud-init[917]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Oct 11 02:44:57 localhost cloud-init[917]: ci-info: | lo | True | ::1/128 | . | host | . | Oct 11 02:44:57 localhost cloud-init[917]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Oct 11 02:44:57 localhost cloud-init[917]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Oct 11 02:44:57 localhost cloud-init[917]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Oct 11 02:44:57 localhost cloud-init[917]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Oct 11 02:44:57 localhost cloud-init[917]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Oct 11 02:44:57 localhost cloud-init[917]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Oct 11 02:44:57 localhost cloud-init[917]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Oct 11 02:44:57 localhost cloud-init[917]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Oct 11 02:44:57 localhost cloud-init[917]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Oct 11 02:44:57 localhost cloud-init[917]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Oct 11 02:44:57 localhost cloud-init[917]: ci-info: +-------+-------------+---------+-----------+-------+ Oct 11 02:44:57 localhost cloud-init[917]: ci-info: | Route | Destination | Gateway | Interface | Flags | Oct 11 02:44:57 localhost cloud-init[917]: ci-info: +-------+-------------+---------+-----------+-------+ Oct 11 02:44:57 localhost cloud-init[917]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Oct 11 02:44:57 localhost cloud-init[917]: ci-info: | 3 | multicast | :: | eth0 | U | Oct 11 02:44:57 localhost cloud-init[917]: ci-info: +-------+-------------+---------+-----------+-------+ Oct 11 02:44:58 localhost systemd[1]: Starting Authorization Manager... Oct 11 02:44:58 localhost systemd[1]: Started Dynamic System Tuning Daemon. Oct 11 02:44:58 localhost polkitd[1035]: Started polkitd version 0.117 Oct 11 02:44:58 localhost systemd[1]: Started Authorization Manager. Oct 11 02:45:02 localhost cloud-init[917]: Generating public/private rsa key pair. Oct 11 02:45:02 localhost cloud-init[917]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Oct 11 02:45:02 localhost cloud-init[917]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Oct 11 02:45:02 localhost cloud-init[917]: The key fingerprint is: Oct 11 02:45:02 localhost cloud-init[917]: SHA256:blOKzJBh7WTkpoy6IO8gXsuAcQCMoL4Kxl12HdWIFiw root@np0005481012.novalocal Oct 11 02:45:02 localhost cloud-init[917]: The key's randomart image is: Oct 11 02:45:02 localhost cloud-init[917]: +---[RSA 3072]----+ Oct 11 02:45:02 localhost cloud-init[917]: |* . ..o.o | Oct 11 02:45:02 localhost cloud-init[917]: |+. + E +.. . | Oct 11 02:45:02 localhost cloud-init[917]: |o o * o. | Oct 11 02:45:02 localhost cloud-init[917]: |.. + O . . | Oct 11 02:45:02 localhost cloud-init[917]: |..o =o..S.. | Oct 11 02:45:02 localhost cloud-init[917]: |o+o o+.o o | Oct 11 02:45:02 localhost cloud-init[917]: |O= o + = | Oct 11 02:45:02 localhost cloud-init[917]: |O++ . . . | Oct 11 02:45:02 localhost cloud-init[917]: |oooo | Oct 11 02:45:02 localhost cloud-init[917]: +----[SHA256]-----+ Oct 11 02:45:02 localhost cloud-init[917]: Generating public/private ecdsa key pair. Oct 11 02:45:02 localhost cloud-init[917]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Oct 11 02:45:02 localhost cloud-init[917]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Oct 11 02:45:02 localhost cloud-init[917]: The key fingerprint is: Oct 11 02:45:02 localhost cloud-init[917]: SHA256:2w0/RXH9hnMBlgUVwbr9oIgI0Fp9vBoYmGU/46KQl4c root@np0005481012.novalocal Oct 11 02:45:02 localhost cloud-init[917]: The key's randomart image is: Oct 11 02:45:02 localhost cloud-init[917]: +---[ECDSA 256]---+ Oct 11 02:45:02 localhost cloud-init[917]: | +O==| Oct 11 02:45:02 localhost cloud-init[917]: | o .. =.| Oct 11 02:45:02 localhost cloud-init[917]: | * o . o.o| Oct 11 02:45:02 localhost cloud-init[917]: | + + = o oo +| Oct 11 02:45:02 localhost cloud-init[917]: | . * + +S.. ++ | Oct 11 02:45:02 localhost cloud-init[917]: |o E = o .o + o.. | Oct 11 02:45:02 localhost cloud-init[917]: | o o o +....+. ..| Oct 11 02:45:02 localhost cloud-init[917]: | . o . . .. .| Oct 11 02:45:02 localhost cloud-init[917]: | | Oct 11 02:45:02 localhost cloud-init[917]: +----[SHA256]-----+ Oct 11 02:45:02 localhost cloud-init[917]: Generating public/private ed25519 key pair. Oct 11 02:45:02 localhost cloud-init[917]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Oct 11 02:45:02 localhost cloud-init[917]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Oct 11 02:45:02 localhost cloud-init[917]: The key fingerprint is: Oct 11 02:45:02 localhost cloud-init[917]: SHA256:QAap0KsyIoyZ5Nz+PpIxa/RyL51Fe/PTYOf7W91OSIo root@np0005481012.novalocal Oct 11 02:45:02 localhost cloud-init[917]: The key's randomart image is: Oct 11 02:45:02 localhost cloud-init[917]: +--[ED25519 256]--+ Oct 11 02:45:02 localhost cloud-init[917]: | . .oo | Oct 11 02:45:02 localhost cloud-init[917]: |. . .o | Oct 11 02:45:02 localhost cloud-init[917]: | . o . | Oct 11 02:45:02 localhost cloud-init[917]: | .o . . | Oct 11 02:45:02 localhost cloud-init[917]: |*+. S . . | Oct 11 02:45:02 localhost cloud-init[917]: |X+ = o + = oo| Oct 11 02:45:02 localhost cloud-init[917]: |+.o * . o E = * =| Oct 11 02:45:02 localhost cloud-init[917]: | B = o o =.| Oct 11 02:45:02 localhost cloud-init[917]: | . *o+. .o*| Oct 11 02:45:02 localhost cloud-init[917]: +----[SHA256]-----+ Oct 11 02:45:02 localhost systemd[1]: Finished Initial cloud-init job (metadata service crawler). Oct 11 02:45:02 localhost systemd[1]: Reached target Cloud-config availability. Oct 11 02:45:02 localhost systemd[1]: Reached target Network is Online. Oct 11 02:45:02 localhost chronyd[765]: Selected source 206.108.0.133 (2.rhel.pool.ntp.org) Oct 11 02:45:02 localhost chronyd[765]: System clock TAI offset set to 37 seconds Oct 11 02:45:02 localhost systemd[1]: Starting Apply the settings specified in cloud-config... Oct 11 02:45:02 localhost systemd[1]: Run Insights Client at boot was skipped because of an unmet condition check (ConditionPathExists=/etc/insights-client/.run_insights_client_next_boot). Oct 11 02:45:02 localhost systemd[1]: Starting Crash recovery kernel arming... Oct 11 02:45:02 localhost systemd[1]: Starting Notify NFS peers of a restart... Oct 11 02:45:02 localhost systemd[1]: Starting OpenSSH server daemon... Oct 11 02:45:02 localhost sm-notify[1131]: Version 2.5.4 starting Oct 11 02:45:02 localhost systemd[1]: Starting Permit User Sessions... Oct 11 02:45:02 localhost systemd[1]: Started Notify NFS peers of a restart. Oct 11 02:45:02 localhost systemd[1]: Finished Permit User Sessions. Oct 11 02:45:02 localhost sshd[1132]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:45:02 localhost systemd[1]: Started Command Scheduler. Oct 11 02:45:02 localhost systemd[1]: Started Getty on tty1. Oct 11 02:45:02 localhost systemd[1]: Started Serial Getty on ttyS0. Oct 11 02:45:02 localhost systemd[1]: Reached target Login Prompts. Oct 11 02:45:02 localhost systemd[1]: Started OpenSSH server daemon. Oct 11 02:45:02 localhost systemd[1]: Reached target Multi-User System. Oct 11 02:45:02 localhost sshd[1143]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:45:02 localhost systemd[1]: Starting Record Runlevel Change in UTMP... Oct 11 02:45:02 localhost systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 11 02:45:02 localhost systemd[1]: Finished Record Runlevel Change in UTMP. Oct 11 02:45:02 localhost sshd[1155]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:45:02 localhost sshd[1167]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:45:02 localhost sshd[1178]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:45:02 localhost sshd[1190]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:45:02 localhost kdumpctl[1135]: kdump: No kdump initial ramdisk found. Oct 11 02:45:02 localhost kdumpctl[1135]: kdump: Rebuilding /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img Oct 11 02:45:02 localhost sshd[1198]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:45:02 localhost sshd[1214]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:45:02 localhost sshd[1234]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:45:02 localhost sshd[1257]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:45:02 localhost cloud-init[1282]: Cloud-init v. 22.1-9.el9 running 'modules:config' at Sat, 11 Oct 2025 06:45:02 +0000. Up 12.04 seconds. Oct 11 02:45:02 localhost systemd[1]: Finished Apply the settings specified in cloud-config. Oct 11 02:45:02 localhost systemd[1]: Starting Execute cloud user/final scripts... Oct 11 02:45:03 localhost dracut[1434]: dracut-057-21.git20230214.el9 Oct 11 02:45:03 localhost cloud-init[1452]: Cloud-init v. 22.1-9.el9 running 'modules:final' at Sat, 11 Oct 2025 06:45:03 +0000. Up 12.38 seconds. Oct 11 02:45:03 localhost dracut[1436]: Executing: /usr/bin/dracut --add kdumpbase --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics -o "plymouth resume ifcfg earlykdump" --mount "/dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device -f /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img 5.14.0-284.11.1.el9_2.x86_64 Oct 11 02:45:03 localhost cloud-init[1497]: ############################################################# Oct 11 02:45:03 localhost cloud-init[1500]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Oct 11 02:45:03 localhost cloud-init[1508]: 256 SHA256:2w0/RXH9hnMBlgUVwbr9oIgI0Fp9vBoYmGU/46KQl4c root@np0005481012.novalocal (ECDSA) Oct 11 02:45:03 localhost cloud-init[1518]: 256 SHA256:QAap0KsyIoyZ5Nz+PpIxa/RyL51Fe/PTYOf7W91OSIo root@np0005481012.novalocal (ED25519) Oct 11 02:45:03 localhost cloud-init[1529]: 3072 SHA256:blOKzJBh7WTkpoy6IO8gXsuAcQCMoL4Kxl12HdWIFiw root@np0005481012.novalocal (RSA) Oct 11 02:45:03 localhost cloud-init[1534]: -----END SSH HOST KEY FINGERPRINTS----- Oct 11 02:45:03 localhost cloud-init[1538]: ############################################################# Oct 11 02:45:03 localhost cloud-init[1452]: Cloud-init v. 22.1-9.el9 finished at Sat, 11 Oct 2025 06:45:03 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 12.61 seconds Oct 11 02:45:03 localhost dracut[1436]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Oct 11 02:45:03 localhost systemd[1]: Reloading Network Manager... Oct 11 02:45:03 localhost dracut[1436]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Oct 11 02:45:03 localhost NetworkManager[788]: [1760165103.4931] audit: op="reload" arg="0" pid=1588 uid=0 result="success" Oct 11 02:45:03 localhost NetworkManager[788]: [1760165103.4939] config: signal: SIGHUP (no changes from disk) Oct 11 02:45:03 localhost dracut[1436]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Oct 11 02:45:03 localhost systemd[1]: Reloaded Network Manager. Oct 11 02:45:03 localhost systemd[1]: Finished Execute cloud user/final scripts. Oct 11 02:45:03 localhost systemd[1]: Reached target Cloud-init target. Oct 11 02:45:03 localhost dracut[1436]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Oct 11 02:45:03 localhost dracut[1436]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Oct 11 02:45:03 localhost dracut[1436]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Oct 11 02:45:04 localhost dracut[1436]: memstrack is not available Oct 11 02:45:04 localhost dracut[1436]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Oct 11 02:45:04 localhost dracut[1436]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Oct 11 02:45:04 localhost dracut[1436]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Oct 11 02:45:04 localhost dracut[1436]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Oct 11 02:45:04 localhost dracut[1436]: memstrack is not available Oct 11 02:45:04 localhost dracut[1436]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Oct 11 02:45:04 localhost dracut[1436]: *** Including module: systemd *** Oct 11 02:45:04 localhost dracut[1436]: *** Including module: systemd-initrd *** Oct 11 02:45:04 localhost dracut[1436]: *** Including module: i18n *** Oct 11 02:45:04 localhost dracut[1436]: No KEYMAP configured. Oct 11 02:45:04 localhost dracut[1436]: *** Including module: drm *** Oct 11 02:45:05 localhost dracut[1436]: *** Including module: prefixdevname *** Oct 11 02:45:05 localhost dracut[1436]: *** Including module: kernel-modules *** Oct 11 02:45:05 localhost dracut[1436]: *** Including module: kernel-modules-extra *** Oct 11 02:45:05 localhost dracut[1436]: *** Including module: qemu *** Oct 11 02:45:05 localhost dracut[1436]: *** Including module: fstab-sys *** Oct 11 02:45:05 localhost dracut[1436]: *** Including module: rootfs-block *** Oct 11 02:45:05 localhost dracut[1436]: *** Including module: terminfo *** Oct 11 02:45:06 localhost dracut[1436]: *** Including module: udev-rules *** Oct 11 02:45:06 localhost dracut[1436]: Skipping udev rule: 91-permissions.rules Oct 11 02:45:06 localhost dracut[1436]: Skipping udev rule: 80-drivers-modprobe.rules Oct 11 02:45:06 localhost dracut[1436]: *** Including module: virtiofs *** Oct 11 02:45:06 localhost dracut[1436]: *** Including module: dracut-systemd *** Oct 11 02:45:06 localhost dracut[1436]: *** Including module: usrmount *** Oct 11 02:45:06 localhost dracut[1436]: *** Including module: base *** Oct 11 02:45:06 localhost dracut[1436]: *** Including module: fs-lib *** Oct 11 02:45:06 localhost dracut[1436]: *** Including module: kdumpbase *** Oct 11 02:45:07 localhost dracut[1436]: *** Including module: microcode_ctl-fw_dir_override *** Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl module: mangling fw_dir Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl: configuration "intel" is ignored Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl: configuration "intel-06-2d-07" is ignored Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl: configuration "intel-06-4e-03" is ignored Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl: configuration "intel-06-4f-01" is ignored Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl: configuration "intel-06-55-04" is ignored Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl: configuration "intel-06-5e-03" is ignored Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl: configuration "intel-06-8c-01" is ignored Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Oct 11 02:45:07 localhost dracut[1436]: microcode_ctl: final fw_dir: "/lib/firmware/updates/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware/updates /lib/firmware/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware" Oct 11 02:45:07 localhost dracut[1436]: *** Including module: shutdown *** Oct 11 02:45:07 localhost dracut[1436]: *** Including module: squash *** Oct 11 02:45:07 localhost dracut[1436]: *** Including modules done *** Oct 11 02:45:07 localhost dracut[1436]: *** Installing kernel module dependencies *** Oct 11 02:45:07 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Oct 11 02:45:08 localhost dracut[1436]: *** Installing kernel module dependencies done *** Oct 11 02:45:08 localhost dracut[1436]: *** Resolving executable dependencies *** Oct 11 02:45:09 localhost dracut[1436]: *** Resolving executable dependencies done *** Oct 11 02:45:09 localhost dracut[1436]: *** Hardlinking files *** Oct 11 02:45:09 localhost dracut[1436]: Mode: real Oct 11 02:45:09 localhost dracut[1436]: Files: 1099 Oct 11 02:45:09 localhost dracut[1436]: Linked: 3 files Oct 11 02:45:09 localhost dracut[1436]: Compared: 0 xattrs Oct 11 02:45:09 localhost dracut[1436]: Compared: 373 files Oct 11 02:45:09 localhost dracut[1436]: Saved: 61.04 KiB Oct 11 02:45:09 localhost dracut[1436]: Duration: 0.034554 seconds Oct 11 02:45:09 localhost dracut[1436]: *** Hardlinking files done *** Oct 11 02:45:09 localhost dracut[1436]: Could not find 'strip'. Not stripping the initramfs. Oct 11 02:45:09 localhost dracut[1436]: *** Generating early-microcode cpio image *** Oct 11 02:45:09 localhost dracut[1436]: *** Constructing AuthenticAMD.bin *** Oct 11 02:45:09 localhost dracut[1436]: *** Store current command line parameters *** Oct 11 02:45:09 localhost dracut[1436]: Stored kernel commandline: Oct 11 02:45:09 localhost dracut[1436]: No dracut internal kernel commandline stored in the initramfs Oct 11 02:45:09 localhost dracut[1436]: *** Install squash loader *** Oct 11 02:45:10 localhost dracut[1436]: *** Squashing the files inside the initramfs *** Oct 11 02:45:11 localhost dracut[1436]: *** Squashing the files inside the initramfs done *** Oct 11 02:45:11 localhost dracut[1436]: *** Creating image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' *** Oct 11 02:45:11 localhost dracut[1436]: *** Creating initramfs image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' done *** Oct 11 02:45:11 localhost kdumpctl[1135]: kdump: kexec: loaded kdump kernel Oct 11 02:45:11 localhost kdumpctl[1135]: kdump: Starting kdump: [OK] Oct 11 02:45:11 localhost systemd[1]: Finished Crash recovery kernel arming. Oct 11 02:45:11 localhost systemd[1]: Startup finished in 1.254s (kernel) + 1.966s (initrd) + 17.990s (userspace) = 21.211s. Oct 11 02:45:27 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 11 02:45:29 localhost sshd[4174]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:45:29 localhost systemd[1]: Created slice User Slice of UID 1000. Oct 11 02:45:29 localhost systemd[1]: Starting User Runtime Directory /run/user/1000... Oct 11 02:45:29 localhost systemd-logind[759]: New session 1 of user zuul. Oct 11 02:45:29 localhost systemd[1]: Finished User Runtime Directory /run/user/1000. Oct 11 02:45:29 localhost systemd[1]: Starting User Manager for UID 1000... Oct 11 02:45:29 localhost systemd[4178]: Queued start job for default target Main User Target. Oct 11 02:45:29 localhost systemd[4178]: Created slice User Application Slice. Oct 11 02:45:29 localhost systemd[4178]: Started Mark boot as successful after the user session has run 2 minutes. Oct 11 02:45:29 localhost systemd[4178]: Started Daily Cleanup of User's Temporary Directories. Oct 11 02:45:29 localhost systemd[4178]: Reached target Paths. Oct 11 02:45:29 localhost systemd[4178]: Reached target Timers. Oct 11 02:45:29 localhost systemd[4178]: Starting D-Bus User Message Bus Socket... Oct 11 02:45:29 localhost systemd[4178]: Starting Create User's Volatile Files and Directories... Oct 11 02:45:29 localhost systemd[4178]: Listening on D-Bus User Message Bus Socket. Oct 11 02:45:29 localhost systemd[4178]: Reached target Sockets. Oct 11 02:45:29 localhost systemd[4178]: Finished Create User's Volatile Files and Directories. Oct 11 02:45:29 localhost systemd[4178]: Reached target Basic System. Oct 11 02:45:29 localhost systemd[4178]: Reached target Main User Target. Oct 11 02:45:29 localhost systemd[4178]: Startup finished in 113ms. Oct 11 02:45:29 localhost systemd[1]: Started User Manager for UID 1000. Oct 11 02:45:29 localhost systemd[1]: Started Session 1 of User zuul. Oct 11 02:45:30 localhost python3[4230]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 02:45:35 localhost python3[4248]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 02:45:47 localhost python3[4302]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 02:45:48 localhost python3[4332]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Oct 11 02:45:51 localhost python3[4348]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDXQrx6pLIxXoqpQGqRzt17OwBjD4PLZmfi63TVurUZvJVIZMGvBcxTuHapVdQCfxX0TONIHAe+K14GwtUpdHhJDNyTpnkPpL10is+RNMJP1asVCNq7lbbfWyXm6HjNXNdXLsGkvsfO98JwqwtRI1cYvsPrksXJVusq2XjxibHuDPvIUrQpad8Ayk8NQ/PMIQVZTQgik6WvBAf7stc8A8A4lmCt8s1gOPtBh+se5FWwvl5m2SN9F6kat/G+kYLYQ34UQx1hzLrNJg0CL/x19YJoMoKZyKQxKkvI0yHyIeHMyOwBV0L6ISlNieeEYM1Kts+fX9qNv3kRt3muJ0PpnvXTRJzetE6paWdcEtKyFGTqptuuFD0KbmWuk+clN193JABT2KuQot1MbzbaxQSZZRSVcFLJDrFkhRp//mNW3y5b2e2172hG8xnKraakOcM579snTc8wJe5sIvNzvRl6+gcoiOPZI7cCcQmqcX5hLK9GmLSwbaxNne0a3Pnt73a9aTk= zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:45:52 localhost python3[4362]: ansible-file Invoked with state=directory path=/home/zuul/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:45:53 localhost python3[4421]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 02:45:53 localhost python3[4462]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1760165152.7893834-342-272328777172088/source dest=/home/zuul/.ssh/id_rsa mode=384 force=False _original_basename=773efae287264645b4a175fdf713baba_id_rsa follow=False checksum=e8c66a546e1cd2389f230b7be312477b2102af5f backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:45:54 localhost python3[4535]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 02:45:55 localhost python3[4576]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1760165154.464515-440-211920573313442/source dest=/home/zuul/.ssh/id_rsa.pub mode=420 force=False _original_basename=773efae287264645b4a175fdf713baba_id_rsa.pub follow=False checksum=86e34779490989b3e11d49cf21170e08dc5e60da backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:45:57 localhost python3[4604]: ansible-ping Invoked with data=pong Oct 11 02:45:59 localhost python3[4618]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 02:46:03 localhost python3[4671]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Oct 11 02:46:05 localhost python3[4693]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:05 localhost python3[4707]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:05 localhost python3[4721]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:07 localhost python3[4735]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:07 localhost python3[4749]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:07 localhost python3[4763]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:10 localhost python3[4779]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:11 localhost python3[4827]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 02:46:12 localhost python3[4870]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul/.ansible/tmp/ansible-tmp-1760165171.2402675-54-233615635041347/source follow=False _original_basename=mirror_info.sh.j2 checksum=92d92a03afdddee82732741071f662c729080c35 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:13 localhost python3[4898]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA4Z/c9osaGGtU6X8fgELwfj/yayRurfcKA0HMFfdpPxev2dbwljysMuzoVp4OZmW1gvGtyYPSNRvnzgsaabPNKNo2ym5NToCP6UM+KSe93aln4BcM/24mXChYAbXJQ5Bqq/pIzsGs/pKetQN+vwvMxLOwTvpcsCJBXaa981RKML6xj9l/UZ7IIq1HSEKMvPLxZMWdu0Ut8DkCd5F4nOw9Wgml2uYpDCj5LLCrQQ9ChdOMz8hz6SighhNlRpPkvPaet3OXxr/ytFMu7j7vv06CaEnuMMiY2aTWN1Imin9eHAylIqFHta/3gFfQSWt9jXM7owkBLKL7ATzhaAn+fjNupw== arxcruz@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:13 localhost python3[4912]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDS4Fn6k4deCnIlOtLWqZJyksbepjQt04j8Ed8CGx9EKkj0fKiAxiI4TadXQYPuNHMixZy4Nevjb6aDhL5Z906TfvNHKUrjrG7G26a0k8vdc61NEQ7FmcGMWRLwwc6ReDO7lFpzYKBMk4YqfWgBuGU/K6WLKiVW2cVvwIuGIaYrE1OiiX0iVUUk7KApXlDJMXn7qjSYynfO4mF629NIp8FJal38+Kv+HA+0QkE5Y2xXnzD4Lar5+keymiCHRntPppXHeLIRzbt0gxC7v3L72hpQ3BTBEzwHpeS8KY+SX1y5lRMN45thCHfJqGmARJREDjBvWG8JXOPmVIKQtZmVcD5b mandreou@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:13 localhost python3[4926]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9MiLfy30deHA7xPOAlew5qUq3UP2gmRMYJi8PtkjFB20/DKeWwWNnkZPqP9AayruRoo51SIiVg870gbZE2jYl+Ncx/FYDe56JeC3ySZsXoAVkC9bP7gkOGqOmJjirvAgPMI7bogVz8i+66Q4Ar7OKTp3762G4IuWPPEg4ce4Y7lx9qWocZapHYq4cYKMxrOZ7SEbFSATBbe2bPZAPKTw8do/Eny+Hq/LkHFhIeyra6cqTFQYShr+zPln0Cr+ro/pDX3bB+1ubFgTpjpkkkQsLhDfR6cCdCWM2lgnS3BTtYj5Ct9/JRPR5YOphqZz+uB+OEu2IL68hmU9vNTth1KeX rlandy@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:14 localhost python3[4940]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFCbgz8gdERiJlk2IKOtkjQxEXejrio6ZYMJAVJYpOIp raukadah@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:14 localhost python3[4954]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBqb3Q/9uDf4LmihQ7xeJ9gA/STIQUFPSfyyV0m8AoQi bshewale@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:14 localhost python3[4968]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0I8QqQx0Az2ysJt2JuffucLijhBqnsXKEIx5GyHwxVULROa8VtNFXUDH6ZKZavhiMcmfHB2+TBTda+lDP4FldYj06dGmzCY+IYGa+uDRdxHNGYjvCfLFcmLlzRK6fNbTcui+KlUFUdKe0fb9CRoGKyhlJD5GRkM1Dv+Yb6Bj+RNnmm1fVGYxzmrD2utvffYEb0SZGWxq2R9gefx1q/3wCGjeqvufEV+AskPhVGc5T7t9eyZ4qmslkLh1/nMuaIBFcr9AUACRajsvk6mXrAN1g3HlBf2gQlhi1UEyfbqIQvzzFtsbLDlSum/KmKjy818GzvWjERfQ0VkGzCd9bSLVL dviroel@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:15 localhost python3[4982]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 anbanerj@kaermorhen manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:15 localhost python3[4996]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 dasm@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:15 localhost python3[5010]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHUnwjB20UKmsSed9X73eGNV5AOEFccQ3NYrRW776pEk cjeanner manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:15 localhost python3[5024]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDercCMGn8rW1C4P67tHgtflPdTeXlpyUJYH+6XDd2lR jgilaber@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:16 localhost python3[5038]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAMI6kkg9Wg0sG7jIJmyZemEBwUn1yzNpQQd3gnulOmZ adrianfuscoarnejo@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:16 localhost python3[5052]: ansible-authorized_key Invoked with user=zuul state=present key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPijwpQu/3jhhhBZInXNOLEH57DrknPc3PLbsRvYyJIFzwYjX+WD4a7+nGnMYS42MuZk6TJcVqgnqofVx4isoD4= ramishra@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:16 localhost python3[5067]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGpU/BepK3qX0NRf5Np+dOBDqzQEefhNrw2DCZaH3uWW rebtoor@monolith manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:16 localhost python3[5081]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDK0iKdi8jQTpQrDdLVH/AAgLVYyTXF7AQ1gjc/5uT3t ykarel@yatinkarel manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:17 localhost python3[5095]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF/V/cLotA6LZeO32VL45Hd78skuA2lJA425Sm2LlQeZ fmount@horcrux manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:17 localhost python3[5109]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDa7QCjuDMVmRPo1rREbGwzYeBCYVN+Ou/3WKXZEC6Sr manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:17 localhost python3[5123]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCfNtF7NvKl915TGsGGoseUb06Hj8L/S4toWf0hExeY+F00woL6NvBlJD0nDct+P5a22I4EhvoQCRQ8reaPCm1lybR3uiRIJsj+8zkVvLwby9LXzfZorlNG9ofjd00FEmB09uW/YvTl6Q9XwwwX6tInzIOv3TMqTHHGOL74ibbj8J/FJR0cFEyj0z4WQRvtkh32xAHl83gbuINryMt0sqRI+clj2381NKL55DRLQrVw0gsfqqxiHAnXg21qWmc4J+b9e9kiuAFQjcjwTVkwJCcg3xbPwC/qokYRby/Y5S40UUd7/jEARGXT7RZgpzTuDd1oZiCVrnrqJNPaMNdVv5MLeFdf1B7iIe5aa/fGouX7AO4SdKhZUdnJmCFAGvjC6S3JMZ2wAcUl+OHnssfmdj7XL50cLo27vjuzMtLAgSqi6N99m92WCF2s8J9aVzszX7Xz9OKZCeGsiVJp3/NdABKzSEAyM9xBD/5Vho894Sav+otpySHe3p6RUTgbB5Zu8VyZRZ/UtB3ueXxyo764yrc6qWIDqrehm84Xm9g+/jpIBzGPl07NUNJpdt/6Sgf9RIKXw/7XypO5yZfUcuFNGTxLfqjTNrtgLZNcjfav6sSdVXVcMPL//XNuRdKmVFaO76eV/oGMQGr1fGcCD+N+CpI7+Q+fCNB6VFWG4nZFuI/Iuw== averdagu@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:17 localhost python3[5137]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDq8l27xI+QlQVdS4djp9ogSoyrNE2+Ox6vKPdhSNL1J3PE5w+WCSvMz9A5gnNuH810zwbekEApbxTze/gLQJwBHA52CChfURpXrFaxY7ePXRElwKAL3mJfzBWY/c5jnNL9TCVmFJTGZkFZP3Nh+BMgZvL6xBkt3WKm6Uq18qzd9XeKcZusrA+O+uLv1fVeQnadY9RIqOCyeFYCzLWrUfTyE8x/XG0hAWIM7qpnF2cALQS2h9n4hW5ybiUN790H08wf9hFwEf5nxY9Z9dVkPFQiTSGKNBzmnCXU9skxS/xhpFjJ5duGSZdtAHe9O+nGZm9c67hxgtf8e5PDuqAdXEv2cf6e3VBAt+Bz8EKI3yosTj0oZHfwr42Yzb1l/SKy14Rggsrc9KAQlrGXan6+u2jcQqqx7l+SWmnpFiWTV9u5cWj2IgOhApOitmRBPYqk9rE2usfO0hLn/Pj/R/Nau4803e1/EikdLE7Ps95s9mX5jRDjAoUa2JwFF5RsVFyL910= ashigupt@ashigupt.remote.csb manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:18 localhost python3[5151]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOKLl0NYKwoZ/JY5KeZU8VwRAggeOxqQJeoqp3dsAaY9 manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:18 localhost python3[5165]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIASASQOH2BcOyLKuuDOdWZlPi2orcjcA8q4400T73DLH evallesp@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:18 localhost python3[5179]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILeBWlamUph+jRKV2qrx1PGU7vWuGIt5+z9k96I8WehW amsinha@amsinha-mac manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:18 localhost python3[5193]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIANvVgvJBlK3gb1yz5uef/JqIGq4HLEmY2dYA8e37swb morenod@redhat-laptop manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:19 localhost python3[5207]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 brjackma@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:19 localhost python3[5221]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKwedoZ0TWPJX/z/4TAbO/kKcDZOQVgRH0hAqrL5UCI1 vcastell@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:19 localhost python3[5235]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEmv8sE8GCk6ZTPIqF0FQrttBdL3mq7rCm/IJy0xDFh7 michburk@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:20 localhost python3[5249]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICy6GpGEtwevXEEn4mmLR5lmSLe23dGgAvzkB9DMNbkf rsafrono@rsafrono manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:28 localhost python3[5265]: ansible-community.general.timezone Invoked with name=UTC hwclock=None Oct 11 02:46:28 localhost systemd[1]: Starting Time & Date Service... Oct 11 02:46:28 localhost systemd[1]: Started Time & Date Service. Oct 11 02:46:28 localhost systemd-timedated[5267]: Changed time zone to 'UTC' (UTC). Oct 11 02:46:30 localhost python3[5286]: ansible-file Invoked with path=/etc/nodepool state=directory mode=511 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:31 localhost python3[5332]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 02:46:31 localhost python3[5373]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes src=/home/zuul/.ansible/tmp/ansible-tmp-1760165190.869357-451-123237877179450/source _original_basename=tmpmwcdgok6 follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:32 localhost python3[5433]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 02:46:32 localhost python3[5474]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes_private src=/home/zuul/.ansible/tmp/ansible-tmp-1760165192.320107-540-159226690982795/source _original_basename=tmpy9w5_c1g follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:34 localhost python3[5536]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 02:46:35 localhost python3[5579]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/node_private src=/home/zuul/.ansible/tmp/ansible-tmp-1760165194.5068495-684-214579411390905/source _original_basename=tmpp475_vsn follow=False checksum=fdc491946312142db92bc3cff6285a0a5b207d8c backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:36 localhost python3[5607]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa /etc/nodepool/id_rsa zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:46:36 localhost python3[5623]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa.pub /etc/nodepool/id_rsa.pub zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:46:37 localhost python3[5673]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/zuul-sudo-grep follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 02:46:38 localhost python3[5716]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/zuul-sudo-grep mode=288 src=/home/zuul/.ansible/tmp/ansible-tmp-1760165197.5541875-811-200724165119496/source _original_basename=tmpdhlxxo2x follow=False checksum=bdca1a77493d00fb51567671791f4aa30f66c2f0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:39 localhost python3[5747]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/visudo -c zuul_log_id=fa163ec2-ffbe-125c-55c6-000000000023-1-overcloudcontroller0 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:46:40 localhost python3[5765]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=env#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-125c-55c6-000000000024-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Oct 11 02:46:42 localhost python3[5783]: ansible-file Invoked with path=/home/zuul/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:58 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Oct 11 02:47:02 localhost python3[5802]: ansible-ansible.builtin.file Invoked with path=/etc/ci/env state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:47:39 localhost systemd[4178]: Starting Mark boot as successful... Oct 11 02:47:39 localhost systemd[4178]: Finished Mark boot as successful. Oct 11 02:48:02 localhost systemd-logind[759]: Session 1 logged out. Waiting for processes to exit. Oct 11 02:48:55 localhost kernel: pci 0000:00:07.0: [1af4:1000] type 00 class 0x020000 Oct 11 02:48:55 localhost kernel: pci 0000:00:07.0: reg 0x10: [io 0x0000-0x003f] Oct 11 02:48:55 localhost kernel: pci 0000:00:07.0: reg 0x14: [mem 0x00000000-0x00000fff] Oct 11 02:48:55 localhost kernel: pci 0000:00:07.0: reg 0x20: [mem 0x00000000-0x00003fff 64bit pref] Oct 11 02:48:55 localhost kernel: pci 0000:00:07.0: reg 0x30: [mem 0x00000000-0x0007ffff pref] Oct 11 02:48:55 localhost kernel: pci 0000:00:07.0: BAR 6: assigned [mem 0xc0000000-0xc007ffff pref] Oct 11 02:48:55 localhost kernel: pci 0000:00:07.0: BAR 4: assigned [mem 0x440000000-0x440003fff 64bit pref] Oct 11 02:48:55 localhost kernel: pci 0000:00:07.0: BAR 1: assigned [mem 0xc0080000-0xc0080fff] Oct 11 02:48:55 localhost kernel: pci 0000:00:07.0: BAR 0: assigned [io 0x1000-0x103f] Oct 11 02:48:55 localhost kernel: virtio-pci 0000:00:07.0: enabling device (0000 -> 0003) Oct 11 02:48:55 localhost NetworkManager[788]: [1760165335.8258] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Oct 11 02:48:55 localhost systemd-udevd[5807]: Network interface NamePolicy= disabled on kernel command line. Oct 11 02:48:55 localhost NetworkManager[788]: [1760165335.8393] device (eth1): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Oct 11 02:48:55 localhost NetworkManager[788]: [1760165335.8428] settings: (eth1): created default wired connection 'Wired connection 1' Oct 11 02:48:55 localhost NetworkManager[788]: [1760165335.8435] device (eth1): carrier: link connected Oct 11 02:48:55 localhost NetworkManager[788]: [1760165335.8439] device (eth1): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Oct 11 02:48:55 localhost NetworkManager[788]: [1760165335.8448] policy: auto-activating connection 'Wired connection 1' (093242a4-4bcb-302a-b9c1-db5eb182bb8b) Oct 11 02:48:55 localhost NetworkManager[788]: [1760165335.8455] device (eth1): Activation: starting connection 'Wired connection 1' (093242a4-4bcb-302a-b9c1-db5eb182bb8b) Oct 11 02:48:55 localhost NetworkManager[788]: [1760165335.8457] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Oct 11 02:48:55 localhost NetworkManager[788]: [1760165335.8464] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Oct 11 02:48:55 localhost NetworkManager[788]: [1760165335.8471] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Oct 11 02:48:55 localhost NetworkManager[788]: [1760165335.8477] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Oct 11 02:48:56 localhost sshd[5809]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:48:56 localhost kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready Oct 11 02:48:56 localhost systemd-logind[759]: New session 3 of user zuul. Oct 11 02:48:56 localhost systemd[1]: Started Session 3 of User zuul. Oct 11 02:48:57 localhost python3[5826]: ansible-ansible.legacy.command Invoked with _raw_params=ip -j link zuul_log_id=fa163ec2-ffbe-467a-4b75-000000000254-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:48:57 localhost systemd[1]: Unmounting EFI System Partition Automount... Oct 11 02:48:57 localhost systemd[1]: efi.mount: Deactivated successfully. Oct 11 02:48:57 localhost systemd[1]: Unmounted EFI System Partition Automount. Oct 11 02:49:10 localhost python3[5878]: ansible-ansible.legacy.stat Invoked with path=/etc/NetworkManager/system-connections/ci-private-network.nmconnection follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 02:49:10 localhost python3[5921]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1760165349.8063605-282-123381578108028/source dest=/etc/NetworkManager/system-connections/ci-private-network.nmconnection mode=0600 owner=root group=root follow=False _original_basename=bootstrap-ci-network-nm-connection.nmconnection.j2 checksum=96fc1d51cc1e0832f7d53f7fa38661ab023e5249 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:49:10 localhost python3[5951]: ansible-ansible.builtin.systemd Invoked with name=NetworkManager state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 02:49:10 localhost systemd[1]: NetworkManager-wait-online.service: Deactivated successfully. Oct 11 02:49:10 localhost systemd[1]: Stopped Network Manager Wait Online. Oct 11 02:49:10 localhost systemd[1]: Stopping Network Manager Wait Online... Oct 11 02:49:10 localhost systemd[1]: Stopping Network Manager... Oct 11 02:49:11 localhost NetworkManager[788]: [1760165350.9996] caught SIGTERM, shutting down normally. Oct 11 02:49:11 localhost NetworkManager[788]: [1760165351.0134] dhcp4 (eth0): canceled DHCP transaction Oct 11 02:49:11 localhost NetworkManager[788]: [1760165351.0134] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Oct 11 02:49:11 localhost NetworkManager[788]: [1760165351.0135] dhcp4 (eth0): state changed no lease Oct 11 02:49:11 localhost NetworkManager[788]: [1760165351.0138] manager: NetworkManager state is now CONNECTING Oct 11 02:49:11 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Oct 11 02:49:11 localhost NetworkManager[788]: [1760165351.0235] dhcp4 (eth1): canceled DHCP transaction Oct 11 02:49:11 localhost NetworkManager[788]: [1760165351.0237] dhcp4 (eth1): state changed no lease Oct 11 02:49:11 localhost NetworkManager[788]: [1760165351.0310] exiting (success) Oct 11 02:49:11 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Oct 11 02:49:11 localhost systemd[1]: NetworkManager.service: Deactivated successfully. Oct 11 02:49:11 localhost systemd[1]: Stopped Network Manager. Oct 11 02:49:11 localhost systemd[1]: NetworkManager.service: Consumed 1.386s CPU time. Oct 11 02:49:11 localhost systemd[1]: Starting Network Manager... Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.0815] NetworkManager (version 1.42.2-1.el9) is starting... (after a restart, boot:4d4ae53b-6f0f-4aff-917f-c980fa015082) Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.0819] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Oct 11 02:49:11 localhost systemd[1]: Started Network Manager. Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.0841] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Oct 11 02:49:11 localhost systemd[1]: Starting Network Manager Wait Online... Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.0896] manager[0x564c07d7f090]: monitoring kernel firmware directory '/lib/firmware'. Oct 11 02:49:11 localhost systemd[1]: Starting Hostname Service... Oct 11 02:49:11 localhost systemd[1]: Started Hostname Service. Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1723] hostname: hostname: using hostnamed Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1723] hostname: static hostname changed from (none) to "np0005481012.novalocal" Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1730] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1737] manager[0x564c07d7f090]: rfkill: Wi-Fi hardware radio set enabled Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1737] manager[0x564c07d7f090]: rfkill: WWAN hardware radio set enabled Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1776] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1776] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1777] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1778] manager: Networking is enabled by state file Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1786] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1786] settings: Loaded settings plugin: keyfile (internal) Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1843] dhcp: init: Using DHCP client 'internal' Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1848] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1856] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1863] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1876] device (lo): Activation: starting connection 'lo' (c80c538d-37ce-46b8-a8de-03e67e0c9a1d) Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1885] device (eth0): carrier: link connected Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1893] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1903] manager: (eth0): assume: will attempt to assume matching connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) (indicated) Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1904] device (eth0): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1916] device (eth0): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1934] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1947] device (eth1): carrier: link connected Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1955] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1966] manager: (eth1): assume: will attempt to assume matching connection 'Wired connection 1' (093242a4-4bcb-302a-b9c1-db5eb182bb8b) (indicated) Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1967] device (eth1): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1977] device (eth1): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.1990] device (eth1): Activation: starting connection 'Wired connection 1' (093242a4-4bcb-302a-b9c1-db5eb182bb8b) Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2027] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2032] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2035] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2039] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2044] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2048] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2053] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2087] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2095] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2101] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2114] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2119] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2136] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2147] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2157] device (lo): Activation: successful, device activated. Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2168] dhcp4 (eth0): state changed new lease, address=38.102.83.145 Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2173] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2292] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2329] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2332] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2337] manager: NetworkManager state is now CONNECTED_SITE Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2341] device (eth0): Activation: successful, device activated. Oct 11 02:49:11 localhost NetworkManager[5963]: [1760165351.2347] manager: NetworkManager state is now CONNECTED_GLOBAL Oct 11 02:49:11 localhost python3[6018]: ansible-ansible.legacy.command Invoked with _raw_params=ip route zuul_log_id=fa163ec2-ffbe-467a-4b75-0000000000ff-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:49:13 localhost sshd[6035]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:49:21 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Oct 11 02:49:41 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 11 02:49:56 localhost NetworkManager[5963]: [1760165396.7703] device (eth1): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Oct 11 02:49:56 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Oct 11 02:49:56 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Oct 11 02:49:56 localhost NetworkManager[5963]: [1760165396.7907] device (eth1): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Oct 11 02:49:56 localhost NetworkManager[5963]: [1760165396.7910] device (eth1): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Oct 11 02:49:56 localhost NetworkManager[5963]: [1760165396.7924] device (eth1): Activation: successful, device activated. Oct 11 02:49:56 localhost NetworkManager[5963]: [1760165396.7934] manager: startup complete Oct 11 02:49:56 localhost systemd[1]: Finished Network Manager Wait Online. Oct 11 02:50:06 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Oct 11 02:50:11 localhost systemd[1]: session-3.scope: Deactivated successfully. Oct 11 02:50:11 localhost systemd[1]: session-3.scope: Consumed 1.347s CPU time. Oct 11 02:50:11 localhost systemd-logind[759]: Session 3 logged out. Waiting for processes to exit. Oct 11 02:50:11 localhost systemd-logind[759]: Removed session 3. Oct 11 02:50:39 localhost systemd[4178]: Created slice User Background Tasks Slice. Oct 11 02:50:39 localhost systemd[4178]: Starting Cleanup of User's Temporary Files and Directories... Oct 11 02:50:39 localhost systemd[4178]: Finished Cleanup of User's Temporary Files and Directories. Oct 11 02:52:37 localhost sshd[6053]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:52:38 localhost systemd-logind[759]: New session 4 of user zuul. Oct 11 02:52:38 localhost systemd[1]: Started Session 4 of User zuul. Oct 11 02:52:38 localhost python3[6104]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/env/networking-info.yml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 02:52:38 localhost python3[6147]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/env/networking-info.yml owner=root group=root mode=0644 src=/home/zuul/.ansible/tmp/ansible-tmp-1760165558.1263096-628-242051224547022/source _original_basename=tmprppwvv_h follow=False checksum=d72dfb4b8a7a438c1089af014d37b6019c0dea8e backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:52:46 localhost systemd[1]: session-4.scope: Deactivated successfully. Oct 11 02:52:46 localhost systemd-logind[759]: Session 4 logged out. Waiting for processes to exit. Oct 11 02:52:46 localhost systemd-logind[759]: Removed session 4. Oct 11 02:58:03 localhost sshd[6164]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:58:39 localhost sshd[6168]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:58:39 localhost systemd-logind[759]: New session 5 of user zuul. Oct 11 02:58:39 localhost systemd[1]: Started Session 5 of User zuul. Oct 11 02:58:39 localhost python3[6187]: ansible-ansible.legacy.command Invoked with _raw_params=lsblk -nd -o MAJ:MIN /dev/vda#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-9394-e238-000000001d22-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:58:41 localhost python3[6206]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/init.scope state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:58:41 localhost python3[6222]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/machine.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:58:41 localhost python3[6238]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/system.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:58:42 localhost python3[6254]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/user.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:58:43 localhost python3[6270]: ansible-ansible.builtin.lineinfile Invoked with path=/etc/systemd/system.conf regexp=^#DefaultIOAccounting=no line=DefaultIOAccounting=yes state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:58:43 localhost python3[6270]: ansible-ansible.builtin.lineinfile [WARNING] Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually Oct 11 02:58:44 localhost python3[6286]: ansible-ansible.builtin.systemd_service Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Oct 11 02:58:44 localhost systemd[1]: Reloading. Oct 11 02:58:44 localhost systemd-rc-local-generator[6304]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 02:58:44 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 02:58:46 localhost python3[6333]: ansible-ansible.builtin.wait_for Invoked with path=/sys/fs/cgroup/system.slice/io.max state=present timeout=30 host=127.0.0.1 connect_timeout=5 delay=0 active_connection_states=['ESTABLISHED', 'FIN_WAIT1', 'FIN_WAIT2', 'SYN_RECV', 'SYN_SENT', 'TIME_WAIT'] sleep=1 port=None search_regex=None exclude_hosts=None msg=None Oct 11 02:58:47 localhost python3[6349]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/init.scope/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:58:47 localhost python3[6367]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/machine.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:58:47 localhost python3[6385]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/system.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:58:47 localhost python3[6403]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/user.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:58:49 localhost python3[6420]: ansible-ansible.legacy.command Invoked with _raw_params=echo "init"; cat /sys/fs/cgroup/init.scope/io.max; echo "machine"; cat /sys/fs/cgroup/machine.slice/io.max; echo "system"; cat /sys/fs/cgroup/system.slice/io.max; echo "user"; cat /sys/fs/cgroup/user.slice/io.max;#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-9394-e238-000000001d28-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:58:50 localhost python3[6440]: ansible-ansible.builtin.stat Invoked with path=/sys/fs/cgroup/kubepods.slice/io.max follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 02:58:53 localhost systemd[1]: session-5.scope: Deactivated successfully. Oct 11 02:58:53 localhost systemd[1]: session-5.scope: Consumed 3.356s CPU time. Oct 11 02:58:53 localhost systemd-logind[759]: Session 5 logged out. Waiting for processes to exit. Oct 11 02:58:53 localhost systemd-logind[759]: Removed session 5. Oct 11 03:00:08 localhost sshd[6446]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:00:08 localhost systemd[1]: Starting Cleanup of Temporary Directories... Oct 11 03:00:08 localhost systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Oct 11 03:00:08 localhost systemd[1]: Finished Cleanup of Temporary Directories. Oct 11 03:00:08 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Oct 11 03:00:08 localhost systemd-logind[759]: New session 6 of user zuul. Oct 11 03:00:08 localhost systemd[1]: Started Session 6 of User zuul. Oct 11 03:00:09 localhost systemd[1]: Starting RHSM dbus service... Oct 11 03:00:09 localhost systemd[1]: Started RHSM dbus service. Oct 11 03:00:09 localhost rhsm-service[6472]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Oct 11 03:00:09 localhost rhsm-service[6472]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Oct 11 03:00:09 localhost rhsm-service[6472]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Oct 11 03:00:09 localhost rhsm-service[6472]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Oct 11 03:00:16 localhost rhsm-service[6472]: INFO [subscription_manager.managerlib:90] Consumer created: np0005481012.novalocal (cbac40ed-0070-46ec-8187-10d3a1f7078f) Oct 11 03:00:16 localhost subscription-manager[6472]: Registered system with identity: cbac40ed-0070-46ec-8187-10d3a1f7078f Oct 11 03:00:18 localhost rhsm-service[6472]: INFO [subscription_manager.entcertlib:131] certs updated: Oct 11 03:00:18 localhost rhsm-service[6472]: Total updates: 1 Oct 11 03:00:18 localhost rhsm-service[6472]: Found (local) serial# [] Oct 11 03:00:18 localhost rhsm-service[6472]: Expected (UEP) serial# [6399733226948473126] Oct 11 03:00:18 localhost rhsm-service[6472]: Added (new) Oct 11 03:00:18 localhost rhsm-service[6472]: [sn:6399733226948473126 ( Content Access,) @ /etc/pki/entitlement/6399733226948473126.pem] Oct 11 03:00:18 localhost rhsm-service[6472]: Deleted (rogue): Oct 11 03:00:18 localhost rhsm-service[6472]: Oct 11 03:00:18 localhost subscription-manager[6472]: Added subscription for 'Content Access' contract 'None' Oct 11 03:00:18 localhost subscription-manager[6472]: Added subscription for product ' Content Access' Oct 11 03:00:41 localhost rhsm-service[6472]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Oct 11 03:00:41 localhost rhsm-service[6472]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Oct 11 03:00:44 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:00:45 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:00:46 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:00:47 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:00:48 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:00:58 localhost python3[6563]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163ec2-ffbe-f08f-490e-00000000000d-1-overcloudcontroller0 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:00:59 localhost python3[6582]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 03:01:29 localhost setsebool[6674]: The virt_use_nfs policy boolean was changed to 1 by root Oct 11 03:01:29 localhost setsebool[6674]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Oct 11 03:01:38 localhost kernel: SELinux: Converting 408 SID table entries... Oct 11 03:01:38 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 03:01:38 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 03:01:38 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 03:01:38 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 03:01:38 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 03:01:38 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 03:01:38 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 03:01:51 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=3 res=1 Oct 11 03:01:51 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 11 03:01:51 localhost systemd[1]: Starting man-db-cache-update.service... Oct 11 03:01:51 localhost systemd[1]: Reloading. Oct 11 03:01:51 localhost systemd-rc-local-generator[7535]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:01:51 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:01:51 localhost systemd[1]: Queuing reload/restart jobs for marked units… Oct 11 03:01:52 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:01:59 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 11 03:01:59 localhost systemd[1]: Finished man-db-cache-update.service. Oct 11 03:01:59 localhost systemd[1]: man-db-cache-update.service: Consumed 9.081s CPU time. Oct 11 03:01:59 localhost systemd[1]: run-r07b05c53e540421f9f5f26e36beb488d.service: Deactivated successfully. Oct 11 03:02:46 localhost podman[18267]: 2025-10-11 07:02:46.075939281 +0000 UTC m=+0.106399090 system refresh Oct 11 03:02:46 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 03:02:46 localhost systemd[4178]: Starting D-Bus User Message Bus... Oct 11 03:02:46 localhost dbus-broker-launch[18327]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Oct 11 03:02:46 localhost dbus-broker-launch[18327]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Oct 11 03:02:46 localhost systemd[4178]: Started D-Bus User Message Bus. Oct 11 03:02:46 localhost journal[18327]: Ready Oct 11 03:02:46 localhost systemd[4178]: selinux: avc: op=load_policy lsm=selinux seqno=3 res=1 Oct 11 03:02:46 localhost systemd[4178]: Created slice Slice /user. Oct 11 03:02:46 localhost systemd[4178]: podman-18308.scope: unit configures an IP firewall, but not running as root. Oct 11 03:02:46 localhost systemd[4178]: (This warning is only shown for the first unit using IP firewalling.) Oct 11 03:02:46 localhost systemd[4178]: Started podman-18308.scope. Oct 11 03:02:47 localhost systemd[4178]: Started podman-pause-c8f18eb1.scope. Oct 11 03:02:49 localhost systemd[1]: session-6.scope: Deactivated successfully. Oct 11 03:02:49 localhost systemd[1]: session-6.scope: Consumed 51.110s CPU time. Oct 11 03:02:49 localhost systemd-logind[759]: Session 6 logged out. Waiting for processes to exit. Oct 11 03:02:49 localhost systemd-logind[759]: Removed session 6. Oct 11 03:03:03 localhost sshd[18333]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:03:03 localhost sshd[18329]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:03:03 localhost sshd[18332]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:03:03 localhost sshd[18331]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:03:03 localhost sshd[18330]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:03:09 localhost sshd[18339]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:03:09 localhost systemd-logind[759]: New session 7 of user zuul. Oct 11 03:03:09 localhost systemd[1]: Started Session 7 of User zuul. Oct 11 03:03:09 localhost python3[18356]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI2AlTQJ+Rt4b+W3cmkamiGed/TWINztiREldQ6kk+w1aihiJeOpTyOudk23srWqhRTljFZtZSodkbyWCFW716w= zuul@np0005481009.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 03:03:10 localhost python3[18372]: ansible-ansible.posix.authorized_key Invoked with user=root key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI2AlTQJ+Rt4b+W3cmkamiGed/TWINztiREldQ6kk+w1aihiJeOpTyOudk23srWqhRTljFZtZSodkbyWCFW716w= zuul@np0005481009.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 03:03:12 localhost systemd[1]: session-7.scope: Deactivated successfully. Oct 11 03:03:12 localhost systemd-logind[759]: Session 7 logged out. Waiting for processes to exit. Oct 11 03:03:12 localhost systemd-logind[759]: Removed session 7. Oct 11 03:04:39 localhost systemd[1]: Starting dnf makecache... Oct 11 03:04:39 localhost dnf[18374]: Updating Subscription Management repositories. Oct 11 03:04:39 localhost sshd[18375]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:04:39 localhost systemd-logind[759]: New session 8 of user zuul. Oct 11 03:04:39 localhost systemd[1]: Started Session 8 of User zuul. Oct 11 03:04:40 localhost python3[18394]: ansible-authorized_key Invoked with user=root manage_dir=True key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDXQrx6pLIxXoqpQGqRzt17OwBjD4PLZmfi63TVurUZvJVIZMGvBcxTuHapVdQCfxX0TONIHAe+K14GwtUpdHhJDNyTpnkPpL10is+RNMJP1asVCNq7lbbfWyXm6HjNXNdXLsGkvsfO98JwqwtRI1cYvsPrksXJVusq2XjxibHuDPvIUrQpad8Ayk8NQ/PMIQVZTQgik6WvBAf7stc8A8A4lmCt8s1gOPtBh+se5FWwvl5m2SN9F6kat/G+kYLYQ34UQx1hzLrNJg0CL/x19YJoMoKZyKQxKkvI0yHyIeHMyOwBV0L6ISlNieeEYM1Kts+fX9qNv3kRt3muJ0PpnvXTRJzetE6paWdcEtKyFGTqptuuFD0KbmWuk+clN193JABT2KuQot1MbzbaxQSZZRSVcFLJDrFkhRp//mNW3y5b2e2172hG8xnKraakOcM579snTc8wJe5sIvNzvRl6+gcoiOPZI7cCcQmqcX5hLK9GmLSwbaxNne0a3Pnt73a9aTk= zuul-build-sshkey state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 03:04:41 localhost dnf[18374]: Failed determining last makecache time. Oct 11 03:04:41 localhost python3[18410]: ansible-user Invoked with name=root state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005481012.novalocal update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Oct 11 03:04:41 localhost dnf[18374]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 45 kB/s | 4.1 kB 00:00 Oct 11 03:04:41 localhost dnf[18374]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 60 kB/s | 4.5 kB 00:00 Oct 11 03:04:41 localhost dnf[18374]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 52 kB/s | 4.1 kB 00:00 Oct 11 03:04:41 localhost dnf[18374]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 55 kB/s | 4.5 kB 00:00 Oct 11 03:04:42 localhost dnf[18374]: Metadata cache created. Oct 11 03:04:42 localhost systemd[1]: dnf-makecache.service: Deactivated successfully. Oct 11 03:04:42 localhost systemd[1]: Finished dnf makecache. Oct 11 03:04:42 localhost systemd[1]: dnf-makecache.service: Consumed 2.495s CPU time. Oct 11 03:04:42 localhost python3[18464]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:04:42 localhost python3[18508]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1760166281.8090568-90-195902437749168/source dest=/root/.ssh/id_rsa mode=384 owner=root force=False _original_basename=773efae287264645b4a175fdf713baba_id_rsa follow=False checksum=e8c66a546e1cd2389f230b7be312477b2102af5f backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:04:44 localhost python3[18570]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:04:44 localhost python3[18613]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1760166283.7332306-180-244537218614153/source dest=/root/.ssh/id_rsa.pub mode=420 owner=root force=False _original_basename=773efae287264645b4a175fdf713baba_id_rsa.pub follow=False checksum=86e34779490989b3e11d49cf21170e08dc5e60da backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:04:47 localhost python3[18643]: ansible-ansible.builtin.file Invoked with path=/etc/nodepool state=directory mode=0777 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:04:47 localhost python3[18689]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:04:48 localhost python3[18705]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes _original_basename=tmpmyk7v5dj recurse=False state=file path=/etc/nodepool/sub_nodes force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:04:49 localhost python3[18765]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:04:49 localhost python3[18781]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes_private _original_basename=tmpov2exzbm recurse=False state=file path=/etc/nodepool/sub_nodes_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:04:50 localhost python3[18841]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:04:51 localhost python3[18857]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/node_private _original_basename=tmpa6grsawu recurse=False state=file path=/etc/nodepool/node_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:04:52 localhost systemd[1]: session-8.scope: Deactivated successfully. Oct 11 03:04:52 localhost systemd[1]: session-8.scope: Consumed 3.496s CPU time. Oct 11 03:04:52 localhost systemd-logind[759]: Session 8 logged out. Waiting for processes to exit. Oct 11 03:04:52 localhost systemd-logind[759]: Removed session 8. Oct 11 03:07:01 localhost sshd[18873]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:07:01 localhost systemd-logind[759]: New session 9 of user zuul. Oct 11 03:07:01 localhost systemd[1]: Started Session 9 of User zuul. Oct 11 03:07:01 localhost python3[18919]: ansible-ansible.legacy.command Invoked with _raw_params=hostname _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:08:20 localhost sshd[18921]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:12:01 localhost systemd[1]: session-9.scope: Deactivated successfully. Oct 11 03:12:01 localhost systemd-logind[759]: Session 9 logged out. Waiting for processes to exit. Oct 11 03:12:01 localhost systemd-logind[759]: Removed session 9. Oct 11 03:16:04 localhost sshd[18926]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:17:47 localhost sshd[18931]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:17:47 localhost systemd-logind[759]: New session 10 of user zuul. Oct 11 03:17:47 localhost systemd[1]: Started Session 10 of User zuul. Oct 11 03:17:47 localhost python3[18948]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163ec2-ffbe-1145-62ad-00000000000c-1-overcloudcontroller0 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:17:49 localhost python3[18968]: ansible-ansible.legacy.command Invoked with _raw_params=yum clean all zuul_log_id=fa163ec2-ffbe-1145-62ad-00000000000d-1-overcloudcontroller0 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:17:54 localhost python3[18987]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-baseos-eus-rpms'] state=enabled purge=False Oct 11 03:17:57 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:18:16 localhost sshd[19128]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:18:50 localhost python3[19145]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-appstream-eus-rpms'] state=enabled purge=False Oct 11 03:18:53 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:18:53 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:19:01 localhost python3[19287]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-highavailability-eus-rpms'] state=enabled purge=False Oct 11 03:19:04 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:19:04 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:19:09 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:19:09 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:19:34 localhost python3[19622]: ansible-community.general.rhsm_repository Invoked with name=['fast-datapath-for-rhel-9-x86_64-rpms'] state=enabled purge=False Oct 11 03:19:37 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:19:38 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:19:43 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:19:43 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:20:06 localhost python3[20017]: ansible-community.general.rhsm_repository Invoked with name=['openstack-17.1-for-rhel-9-x86_64-rpms'] state=enabled purge=False Oct 11 03:20:09 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:20:09 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:20:14 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:20:15 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:20:40 localhost python3[20355]: ansible-ansible.legacy.command Invoked with _raw_params=yum repolist --enabled#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-1145-62ad-000000000013-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:20:45 localhost python3[20374]: ansible-ansible.legacy.dnf Invoked with name=['openvswitch', 'os-net-config', 'ansible-core'] state=present update_cache=True allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 03:20:58 localhost systemd[1]: Started daily update of the root trust anchor for DNSSEC. Oct 11 03:21:08 localhost kernel: SELinux: Converting 502 SID table entries... Oct 11 03:21:08 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 03:21:08 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 03:21:08 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 03:21:08 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 03:21:08 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 03:21:08 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 03:21:08 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 03:21:10 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=4 res=1 Oct 11 03:21:10 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 11 03:21:10 localhost systemd[1]: Starting man-db-cache-update.service... Oct 11 03:21:10 localhost systemd[1]: Reloading. Oct 11 03:21:10 localhost systemd-sysv-generator[21127]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:21:10 localhost systemd-rc-local-generator[21123]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:21:10 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:21:10 localhost systemd[1]: Queuing reload/restart jobs for marked units… Oct 11 03:21:10 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 11 03:21:10 localhost systemd[1]: Finished man-db-cache-update.service. Oct 11 03:21:10 localhost systemd[1]: run-ree7736ff2265412c98560e4687536048.service: Deactivated successfully. Oct 11 03:21:11 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:21:11 localhost rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:21:38 localhost python3[21663]: ansible-ansible.legacy.command Invoked with _raw_params=ansible-galaxy collection install ansible.posix#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-1145-62ad-000000000015-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:22:02 localhost python3[21683]: ansible-ansible.builtin.file Invoked with path=/etc/os-net-config state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:22:02 localhost python3[21731]: ansible-ansible.legacy.stat Invoked with path=/etc/os-net-config/tripleo_config.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:22:03 localhost python3[21774]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1760167322.5281377-286-9274771796817/source dest=/etc/os-net-config/tripleo_config.yaml mode=None follow=False _original_basename=overcloud_net_config.j2 checksum=4997906c68798c344e568ee48e178d8dbd720a7a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:22:04 localhost python3[21804]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Oct 11 03:22:04 localhost systemd-journald[617]: Field hash table of /run/log/journal/0d75598033f175d0e781a840bff83569/system.journal has a fill level at 91.6 (305 of 333 items), suggesting rotation. Oct 11 03:22:04 localhost systemd-journald[617]: /run/log/journal/0d75598033f175d0e781a840bff83569/system.journal: Journal header limits reached or header out-of-date, rotating. Oct 11 03:22:04 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 03:22:04 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 03:22:04 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 03:22:05 localhost python3[21825]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-20 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Oct 11 03:22:05 localhost python3[21845]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-21 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Oct 11 03:22:05 localhost python3[21865]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-22 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Oct 11 03:22:05 localhost python3[21885]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-23 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Oct 11 03:22:09 localhost python3[21905]: ansible-ansible.builtin.systemd Invoked with name=network state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 03:22:09 localhost systemd[1]: Starting LSB: Bring up/down networking... Oct 11 03:22:09 localhost network[21908]: WARN : [network] You are using 'network' service provided by 'network-scripts', which are now deprecated. Oct 11 03:22:09 localhost network[21919]: You are using 'network' service provided by 'network-scripts', which are now deprecated. Oct 11 03:22:09 localhost network[21908]: WARN : [network] 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:09 localhost network[21920]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:09 localhost network[21908]: WARN : [network] It is advised to switch to 'NetworkManager' instead for network management. Oct 11 03:22:09 localhost network[21921]: It is advised to switch to 'NetworkManager' instead for network management. Oct 11 03:22:09 localhost NetworkManager[5963]: [1760167329.3721] audit: op="connections-reload" pid=21949 uid=0 result="success" Oct 11 03:22:09 localhost network[21908]: Bringing up loopback interface: [ OK ] Oct 11 03:22:09 localhost NetworkManager[5963]: [1760167329.5562] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth0" pid=22037 uid=0 result="success" Oct 11 03:22:09 localhost network[21908]: Bringing up interface eth0: [ OK ] Oct 11 03:22:09 localhost systemd[1]: Started LSB: Bring up/down networking. Oct 11 03:22:09 localhost python3[22079]: ansible-ansible.builtin.systemd Invoked with name=openvswitch state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 03:22:10 localhost systemd[1]: Starting Open vSwitch Database Unit... Oct 11 03:22:10 localhost chown[22083]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Oct 11 03:22:10 localhost ovs-ctl[22088]: /etc/openvswitch/conf.db does not exist ... (warning). Oct 11 03:22:10 localhost ovs-ctl[22088]: Creating empty database /etc/openvswitch/conf.db [ OK ] Oct 11 03:22:10 localhost ovs-ctl[22088]: Starting ovsdb-server [ OK ] Oct 11 03:22:10 localhost ovs-vsctl[22137]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.5.1 Oct 11 03:22:10 localhost ovs-vsctl[22157]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.3.5-110.el9fdp "external-ids:system-id=\"9f720006-bf05-413c-a22a-bea62ba8c664\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"rhel\"" "system-version=\"9.2\"" Oct 11 03:22:10 localhost ovs-ctl[22088]: Configuring Open vSwitch system IDs [ OK ] Oct 11 03:22:10 localhost ovs-ctl[22088]: Enabling remote OVSDB managers [ OK ] Oct 11 03:22:10 localhost systemd[1]: Started Open vSwitch Database Unit. Oct 11 03:22:10 localhost ovs-vsctl[22163]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005481012.novalocal Oct 11 03:22:10 localhost systemd[1]: Starting Open vSwitch Delete Transient Ports... Oct 11 03:22:10 localhost systemd[1]: Finished Open vSwitch Delete Transient Ports. Oct 11 03:22:10 localhost systemd[1]: Starting Open vSwitch Forwarding Unit... Oct 11 03:22:10 localhost kernel: openvswitch: Open vSwitch switching datapath Oct 11 03:22:10 localhost ovs-ctl[22207]: Inserting openvswitch module [ OK ] Oct 11 03:22:10 localhost ovs-ctl[22176]: Starting ovs-vswitchd [ OK ] Oct 11 03:22:10 localhost ovs-vsctl[22225]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005481012.novalocal Oct 11 03:22:10 localhost ovs-ctl[22176]: Enabling remote OVSDB managers [ OK ] Oct 11 03:22:10 localhost systemd[1]: Started Open vSwitch Forwarding Unit. Oct 11 03:22:10 localhost systemd[1]: Starting Open vSwitch... Oct 11 03:22:10 localhost systemd[1]: Finished Open vSwitch. Oct 11 03:22:13 localhost python3[22243]: ansible-ansible.legacy.command Invoked with _raw_params=os-net-config -c /etc/os-net-config/tripleo_config.yaml#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-1145-62ad-00000000001a-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:22:14 localhost NetworkManager[5963]: [1760167334.2167] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22401 uid=0 result="success" Oct 11 03:22:14 localhost ifup[22402]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:14 localhost ifup[22403]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:14 localhost ifup[22404]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:14 localhost NetworkManager[5963]: [1760167334.2457] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22410 uid=0 result="success" Oct 11 03:22:14 localhost ovs-vsctl[22412]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex other-config:mac-table-size=50000 -- set bridge br-ex other-config:hwaddr=fa:16:3e:be:d6:77 -- set bridge br-ex fail_mode=standalone -- del-controller br-ex Oct 11 03:22:14 localhost NetworkManager[5963]: [1760167334.2750] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Oct 11 03:22:14 localhost kernel: device ovs-system entered promiscuous mode Oct 11 03:22:14 localhost systemd-udevd[22413]: Network interface NamePolicy= disabled on kernel command line. Oct 11 03:22:14 localhost kernel: Timeout policy base is empty Oct 11 03:22:14 localhost kernel: Failed to associated timeout policy `ovs_test_tp' Oct 11 03:22:14 localhost NetworkManager[5963]: [1760167334.3079] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/5) Oct 11 03:22:14 localhost kernel: device br-ex entered promiscuous mode Oct 11 03:22:14 localhost NetworkManager[5963]: [1760167334.3290] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22439 uid=0 result="success" Oct 11 03:22:14 localhost NetworkManager[5963]: [1760167334.3441] device (br-ex): carrier: link connected Oct 11 03:22:17 localhost NetworkManager[5963]: [1760167337.4024] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22468 uid=0 result="success" Oct 11 03:22:17 localhost NetworkManager[5963]: [1760167337.4503] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22483 uid=0 result="success" Oct 11 03:22:17 localhost NET[22508]: /etc/sysconfig/network-scripts/ifup-post : updated /etc/resolv.conf Oct 11 03:22:17 localhost NetworkManager[5963]: [1760167337.5318] device (eth1): state change: activated -> unmanaged (reason 'unmanaged', sys-iface-state: 'managed') Oct 11 03:22:17 localhost NetworkManager[5963]: [1760167337.5534] dhcp4 (eth1): canceled DHCP transaction Oct 11 03:22:17 localhost NetworkManager[5963]: [1760167337.5535] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Oct 11 03:22:17 localhost NetworkManager[5963]: [1760167337.5535] dhcp4 (eth1): state changed no lease Oct 11 03:22:17 localhost NetworkManager[5963]: [1760167337.5565] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22517 uid=0 result="success" Oct 11 03:22:17 localhost ifup[22518]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:17 localhost ifup[22519]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:17 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Oct 11 03:22:17 localhost ifup[22521]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:17 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Oct 11 03:22:17 localhost NetworkManager[5963]: [1760167337.5944] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22535 uid=0 result="success" Oct 11 03:22:17 localhost NetworkManager[5963]: [1760167337.6424] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22545 uid=0 result="success" Oct 11 03:22:17 localhost NetworkManager[5963]: [1760167337.6500] device (eth1): carrier: link connected Oct 11 03:22:17 localhost NetworkManager[5963]: [1760167337.6711] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22554 uid=0 result="success" Oct 11 03:22:17 localhost ipv6_wait_tentative[22566]: Waiting for interface eth1 IPv6 address(es) to leave the 'tentative' state Oct 11 03:22:18 localhost ipv6_wait_tentative[22571]: Waiting for interface eth1 IPv6 address(es) to leave the 'tentative' state Oct 11 03:22:19 localhost NetworkManager[5963]: [1760167339.7358] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22580 uid=0 result="success" Oct 11 03:22:19 localhost ovs-vsctl[22595]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex eth1 -- add-port br-ex eth1 Oct 11 03:22:19 localhost kernel: device eth1 entered promiscuous mode Oct 11 03:22:19 localhost NetworkManager[5963]: [1760167339.8252] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22603 uid=0 result="success" Oct 11 03:22:19 localhost ifup[22604]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:19 localhost ifup[22605]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:19 localhost ifup[22606]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:19 localhost NetworkManager[5963]: [1760167339.8459] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22612 uid=0 result="success" Oct 11 03:22:19 localhost NetworkManager[5963]: [1760167339.8825] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22622 uid=0 result="success" Oct 11 03:22:19 localhost ifup[22623]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:19 localhost ifup[22624]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:19 localhost ifup[22625]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:19 localhost NetworkManager[5963]: [1760167339.9136] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22631 uid=0 result="success" Oct 11 03:22:19 localhost ovs-vsctl[22634]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Oct 11 03:22:19 localhost kernel: device vlan44 entered promiscuous mode Oct 11 03:22:19 localhost NetworkManager[5963]: [1760167339.9524] manager: (vlan44): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Oct 11 03:22:19 localhost systemd-udevd[22636]: Network interface NamePolicy= disabled on kernel command line. Oct 11 03:22:19 localhost NetworkManager[5963]: [1760167339.9711] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22645 uid=0 result="success" Oct 11 03:22:19 localhost NetworkManager[5963]: [1760167339.9896] device (vlan44): carrier: link connected Oct 11 03:22:23 localhost NetworkManager[5963]: [1760167343.0335] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22674 uid=0 result="success" Oct 11 03:22:23 localhost NetworkManager[5963]: [1760167343.0809] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22689 uid=0 result="success" Oct 11 03:22:23 localhost NetworkManager[5963]: [1760167343.1278] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22710 uid=0 result="success" Oct 11 03:22:23 localhost ifup[22711]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:23 localhost ifup[22712]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:23 localhost ifup[22713]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:23 localhost NetworkManager[5963]: [1760167343.1557] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22719 uid=0 result="success" Oct 11 03:22:23 localhost ovs-vsctl[22722]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Oct 11 03:22:23 localhost NetworkManager[5963]: [1760167343.1840] manager: (vlan22): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Oct 11 03:22:23 localhost kernel: device vlan22 entered promiscuous mode Oct 11 03:22:23 localhost systemd-udevd[22725]: Network interface NamePolicy= disabled on kernel command line. Oct 11 03:22:23 localhost NetworkManager[5963]: [1760167343.2006] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22734 uid=0 result="success" Oct 11 03:22:23 localhost NetworkManager[5963]: [1760167343.2165] device (vlan22): carrier: link connected Oct 11 03:22:26 localhost NetworkManager[5963]: [1760167346.2626] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22764 uid=0 result="success" Oct 11 03:22:26 localhost NetworkManager[5963]: [1760167346.3048] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22779 uid=0 result="success" Oct 11 03:22:26 localhost NetworkManager[5963]: [1760167346.3589] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22800 uid=0 result="success" Oct 11 03:22:26 localhost ifup[22801]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:26 localhost ifup[22802]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:26 localhost ifup[22803]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:26 localhost NetworkManager[5963]: [1760167346.3859] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22809 uid=0 result="success" Oct 11 03:22:26 localhost ovs-vsctl[22812]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Oct 11 03:22:26 localhost kernel: device vlan23 entered promiscuous mode Oct 11 03:22:26 localhost NetworkManager[5963]: [1760167346.4715] manager: (vlan23): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Oct 11 03:22:26 localhost systemd-udevd[22815]: Network interface NamePolicy= disabled on kernel command line. Oct 11 03:22:26 localhost NetworkManager[5963]: [1760167346.4951] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22824 uid=0 result="success" Oct 11 03:22:26 localhost NetworkManager[5963]: [1760167346.5120] device (vlan23): carrier: link connected Oct 11 03:22:27 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Oct 11 03:22:29 localhost NetworkManager[5963]: [1760167349.5628] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22854 uid=0 result="success" Oct 11 03:22:29 localhost NetworkManager[5963]: [1760167349.6035] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22869 uid=0 result="success" Oct 11 03:22:29 localhost NetworkManager[5963]: [1760167349.6625] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22890 uid=0 result="success" Oct 11 03:22:29 localhost ifup[22891]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:29 localhost ifup[22892]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:29 localhost ifup[22893]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:29 localhost NetworkManager[5963]: [1760167349.6922] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22899 uid=0 result="success" Oct 11 03:22:29 localhost ovs-vsctl[22902]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Oct 11 03:22:29 localhost kernel: device vlan21 entered promiscuous mode Oct 11 03:22:29 localhost systemd-udevd[22904]: Network interface NamePolicy= disabled on kernel command line. Oct 11 03:22:29 localhost NetworkManager[5963]: [1760167349.7631] manager: (vlan21): new Generic device (/org/freedesktop/NetworkManager/Devices/9) Oct 11 03:22:29 localhost NetworkManager[5963]: [1760167349.7831] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22914 uid=0 result="success" Oct 11 03:22:29 localhost NetworkManager[5963]: [1760167349.7999] device (vlan21): carrier: link connected Oct 11 03:22:32 localhost NetworkManager[5963]: [1760167352.8501] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22944 uid=0 result="success" Oct 11 03:22:32 localhost NetworkManager[5963]: [1760167352.8929] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22959 uid=0 result="success" Oct 11 03:22:32 localhost NetworkManager[5963]: [1760167352.9442] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22980 uid=0 result="success" Oct 11 03:22:32 localhost ifup[22981]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:32 localhost ifup[22982]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:32 localhost ifup[22983]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:32 localhost NetworkManager[5963]: [1760167352.9712] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22989 uid=0 result="success" Oct 11 03:22:32 localhost ovs-vsctl[22992]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Oct 11 03:22:33 localhost kernel: device vlan20 entered promiscuous mode Oct 11 03:22:33 localhost systemd-udevd[22994]: Network interface NamePolicy= disabled on kernel command line. Oct 11 03:22:33 localhost NetworkManager[5963]: [1760167353.0043] manager: (vlan20): new Generic device (/org/freedesktop/NetworkManager/Devices/10) Oct 11 03:22:33 localhost NetworkManager[5963]: [1760167353.0229] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23004 uid=0 result="success" Oct 11 03:22:33 localhost NetworkManager[5963]: [1760167353.0404] device (vlan20): carrier: link connected Oct 11 03:22:36 localhost NetworkManager[5963]: [1760167356.1018] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23034 uid=0 result="success" Oct 11 03:22:36 localhost NetworkManager[5963]: [1760167356.1495] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23049 uid=0 result="success" Oct 11 03:22:36 localhost NetworkManager[5963]: [1760167356.2132] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23070 uid=0 result="success" Oct 11 03:22:36 localhost ifup[23071]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:36 localhost ifup[23072]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:36 localhost ifup[23073]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:36 localhost NetworkManager[5963]: [1760167356.2450] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23079 uid=0 result="success" Oct 11 03:22:36 localhost ovs-vsctl[23082]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Oct 11 03:22:36 localhost NetworkManager[5963]: [1760167356.3034] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23089 uid=0 result="success" Oct 11 03:22:37 localhost NetworkManager[5963]: [1760167357.3512] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23116 uid=0 result="success" Oct 11 03:22:37 localhost NetworkManager[5963]: [1760167357.3860] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23131 uid=0 result="success" Oct 11 03:22:37 localhost NetworkManager[5963]: [1760167357.4373] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23152 uid=0 result="success" Oct 11 03:22:37 localhost ifup[23153]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:37 localhost ifup[23154]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:37 localhost ifup[23155]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:37 localhost NetworkManager[5963]: [1760167357.4702] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23161 uid=0 result="success" Oct 11 03:22:37 localhost ovs-vsctl[23164]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Oct 11 03:22:37 localhost NetworkManager[5963]: [1760167357.5260] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23171 uid=0 result="success" Oct 11 03:22:38 localhost NetworkManager[5963]: [1760167358.5793] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23199 uid=0 result="success" Oct 11 03:22:38 localhost NetworkManager[5963]: [1760167358.6190] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23214 uid=0 result="success" Oct 11 03:22:38 localhost NetworkManager[5963]: [1760167358.6731] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23235 uid=0 result="success" Oct 11 03:22:38 localhost ifup[23236]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:38 localhost ifup[23237]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:38 localhost ifup[23238]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:38 localhost NetworkManager[5963]: [1760167358.7041] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23244 uid=0 result="success" Oct 11 03:22:38 localhost ovs-vsctl[23247]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Oct 11 03:22:38 localhost NetworkManager[5963]: [1760167358.7691] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23254 uid=0 result="success" Oct 11 03:22:39 localhost NetworkManager[5963]: [1760167359.8272] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23282 uid=0 result="success" Oct 11 03:22:39 localhost NetworkManager[5963]: [1760167359.8666] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23297 uid=0 result="success" Oct 11 03:22:39 localhost NetworkManager[5963]: [1760167359.9242] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23318 uid=0 result="success" Oct 11 03:22:39 localhost ifup[23319]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:39 localhost ifup[23320]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:39 localhost ifup[23321]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:39 localhost NetworkManager[5963]: [1760167359.9511] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23327 uid=0 result="success" Oct 11 03:22:39 localhost ovs-vsctl[23330]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Oct 11 03:22:40 localhost NetworkManager[5963]: [1760167360.0034] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23337 uid=0 result="success" Oct 11 03:22:41 localhost NetworkManager[5963]: [1760167361.0549] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23365 uid=0 result="success" Oct 11 03:22:41 localhost NetworkManager[5963]: [1760167361.0954] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23380 uid=0 result="success" Oct 11 03:22:41 localhost NetworkManager[5963]: [1760167361.1531] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23401 uid=0 result="success" Oct 11 03:22:41 localhost ifup[23402]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:41 localhost ifup[23403]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:41 localhost ifup[23404]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:41 localhost NetworkManager[5963]: [1760167361.1834] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23410 uid=0 result="success" Oct 11 03:22:41 localhost ovs-vsctl[23413]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Oct 11 03:22:41 localhost NetworkManager[5963]: [1760167361.2418] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23420 uid=0 result="success" Oct 11 03:22:42 localhost NetworkManager[5963]: [1760167362.2980] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23448 uid=0 result="success" Oct 11 03:22:42 localhost NetworkManager[5963]: [1760167362.3421] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23463 uid=0 result="success" Oct 11 03:23:35 localhost python3[23496]: ansible-ansible.legacy.command Invoked with _raw_params=ip a#012ping -c 2 -W 2 192.168.122.10#012ping -c 2 -W 2 192.168.122.11#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-1145-62ad-00000000001b-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:23:41 localhost python3[23517]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 03:23:42 localhost python3[23533]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDXQrx6pLIxXoqpQGqRzt17OwBjD4PLZmfi63TVurUZvJVIZMGvBcxTuHapVdQCfxX0TONIHAe+K14GwtUpdHhJDNyTpnkPpL10is+RNMJP1asVCNq7lbbfWyXm6HjNXNdXLsGkvsfO98JwqwtRI1cYvsPrksXJVusq2XjxibHuDPvIUrQpad8Ayk8NQ/PMIQVZTQgik6WvBAf7stc8A8A4lmCt8s1gOPtBh+se5FWwvl5m2SN9F6kat/G+kYLYQ34UQx1hzLrNJg0CL/x19YJoMoKZyKQxKkvI0yHyIeHMyOwBV0L6ISlNieeEYM1Kts+fX9qNv3kRt3muJ0PpnvXTRJzetE6paWdcEtKyFGTqptuuFD0KbmWuk+clN193JABT2KuQot1MbzbaxQSZZRSVcFLJDrFkhRp//mNW3y5b2e2172hG8xnKraakOcM579snTc8wJe5sIvNzvRl6+gcoiOPZI7cCcQmqcX5hLK9GmLSwbaxNne0a3Pnt73a9aTk= zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 03:23:43 localhost python3[23547]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 03:23:44 localhost python3[23563]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 03:23:45 localhost python3[23577]: ansible-ansible.builtin.slurp Invoked with path=/etc/hostname src=/etc/hostname Oct 11 03:23:46 localhost python3[23592]: ansible-ansible.legacy.command Invoked with _raw_params=hostname="np0005481012.novalocal"#012hostname_str_array=(${hostname//./ })#012echo ${hostname_str_array[0]} > /home/zuul/ansible_hostname#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-1145-62ad-000000000022-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:23:46 localhost python3[23612]: ansible-ansible.legacy.command Invoked with _raw_params=hostname=$(cat /home/zuul/ansible_hostname)#012hostnamectl hostname "$hostname.ooo.test"#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-1145-62ad-000000000023-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:23:46 localhost systemd[1]: Starting Hostname Service... Oct 11 03:23:46 localhost systemd[1]: Started Hostname Service. Oct 11 03:23:46 localhost systemd-hostnamed[23616]: Hostname set to (static) Oct 11 03:23:46 localhost NetworkManager[5963]: [1760167426.9670] hostname: static hostname changed from "np0005481012.novalocal" to "np0005481012.ooo.test" Oct 11 03:23:46 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Oct 11 03:23:46 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Oct 11 03:23:48 localhost systemd[1]: session-10.scope: Deactivated successfully. Oct 11 03:23:48 localhost systemd[1]: session-10.scope: Consumed 1min 43.582s CPU time. Oct 11 03:23:48 localhost systemd-logind[759]: Session 10 logged out. Waiting for processes to exit. Oct 11 03:23:48 localhost systemd-logind[759]: Removed session 10. Oct 11 03:23:49 localhost sshd[23628]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:23:50 localhost systemd-logind[759]: New session 11 of user zuul. Oct 11 03:23:50 localhost systemd[1]: Started Session 11 of User zuul. Oct 11 03:23:50 localhost python3[23645]: ansible-ansible.builtin.slurp Invoked with path=/home/zuul/ansible_hostname src=/home/zuul/ansible_hostname Oct 11 03:23:53 localhost systemd[1]: session-11.scope: Deactivated successfully. Oct 11 03:23:53 localhost systemd-logind[759]: Session 11 logged out. Waiting for processes to exit. Oct 11 03:23:53 localhost systemd-logind[759]: Removed session 11. Oct 11 03:23:57 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Oct 11 03:23:58 localhost sshd[23648]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:23:58 localhost systemd-logind[759]: New session 12 of user zuul. Oct 11 03:23:58 localhost systemd[1]: Started Session 12 of User zuul. Oct 11 03:23:59 localhost python3[23667]: ansible-ansible.legacy.dnf Invoked with name=['ipa-client'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 03:24:07 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Oct 11 03:24:07 localhost dbus-broker-launch[18327]: Noticed file-system modification, trigger reload. Oct 11 03:24:07 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Oct 11 03:24:07 localhost dbus-broker-launch[18327]: Service file '/usr/share/dbus-1/services/certmonger.service' is not named after the D-Bus name 'org.fedorahosted.certmonger'. Oct 11 03:24:07 localhost dbus-broker-launch[18327]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Oct 11 03:24:07 localhost dbus-broker-launch[18327]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Oct 11 03:24:07 localhost systemd[1]: Reloading. Oct 11 03:24:07 localhost systemd-rc-local-generator[23762]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:24:07 localhost systemd-sysv-generator[23766]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:24:07 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:24:16 localhost kernel: SELinux: Converting 538 SID table entries... Oct 11 03:24:16 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 03:24:16 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 03:24:16 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 03:24:16 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 03:24:16 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 03:24:16 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 03:24:16 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 03:24:16 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Oct 11 03:24:16 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=5 res=1 Oct 11 03:24:16 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 11 03:24:17 localhost systemd[1]: Stopping OpenSSH server daemon... Oct 11 03:24:17 localhost systemd[1]: sshd.service: Deactivated successfully. Oct 11 03:24:17 localhost systemd[1]: Stopped OpenSSH server daemon. Oct 11 03:24:17 localhost systemd[1]: sshd.service: Consumed 1.117s CPU time. Oct 11 03:24:17 localhost systemd[1]: Stopped target sshd-keygen.target. Oct 11 03:24:17 localhost systemd[1]: Stopping sshd-keygen.target... Oct 11 03:24:17 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 03:24:17 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 03:24:17 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 03:24:17 localhost systemd[1]: Reached target sshd-keygen.target. Oct 11 03:24:17 localhost systemd[1]: Starting OpenSSH server daemon... Oct 11 03:24:17 localhost sshd[23806]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:24:17 localhost systemd[1]: Started OpenSSH server daemon. Oct 11 03:24:18 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 11 03:24:18 localhost systemd[1]: Starting man-db-cache-update.service... Oct 11 03:24:18 localhost systemd[1]: Reloading. Oct 11 03:24:18 localhost systemd-rc-local-generator[24408]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:24:18 localhost systemd-sysv-generator[24414]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:24:18 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:24:18 localhost systemd[1]: Queuing reload/restart jobs for marked units… Oct 11 03:24:18 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 11 03:24:19 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 11 03:24:19 localhost systemd[1]: Finished man-db-cache-update.service. Oct 11 03:24:19 localhost systemd[1]: man-db-cache-update.service: Consumed 1.172s CPU time. Oct 11 03:24:19 localhost systemd[1]: run-rb793ff9cbddd48e48493e6bddd59b873.service: Deactivated successfully. Oct 11 03:24:19 localhost systemd[1]: run-r96358d15407744cf8199c2a1b99d4bf3.service: Deactivated successfully. Oct 11 03:25:01 localhost sshd[25768]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:25:19 localhost systemd[1]: session-12.scope: Deactivated successfully. Oct 11 03:25:19 localhost systemd[1]: session-12.scope: Consumed 17.239s CPU time. Oct 11 03:25:19 localhost systemd-logind[759]: Session 12 logged out. Waiting for processes to exit. Oct 11 03:25:19 localhost systemd-logind[759]: Removed session 12. Oct 11 03:26:22 localhost sshd[25770]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:26:22 localhost systemd-logind[759]: New session 13 of user zuul. Oct 11 03:26:22 localhost systemd[1]: Started Session 13 of User zuul. Oct 11 03:26:22 localhost python3[25821]: ansible-ansible.legacy.stat Invoked with path=/etc/resolv.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:26:22 localhost python3[25866]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1760167582.2049596-62-17545399657854/source dest=/etc/resolv.conf owner=root group=root mode=420 follow=False _original_basename=ipa_resolv_conf.j2 checksum=edbe9a45130a7ebff5948216d04bc5bb05808e49 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:26:27 localhost python3[25896]: ansible-ansible.legacy.command Invoked with _raw_params=ip route add 10.255.255.25 via 192.168.122.100 dev br-ex _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:26:29 localhost python3[25914]: ansible-ansible.builtin.file Invoked with path=/etc/pki/CA state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:27:29 localhost systemd[1]: session-13.scope: Deactivated successfully. Oct 11 03:27:29 localhost systemd[1]: session-13.scope: Consumed 1.050s CPU time. Oct 11 03:27:29 localhost systemd-logind[759]: Session 13 logged out. Waiting for processes to exit. Oct 11 03:27:29 localhost systemd-logind[759]: Removed session 13. Oct 11 03:28:23 localhost sshd[25915]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:23 localhost sshd[25916]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:24 localhost sshd[25917]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:27 localhost sshd[25919]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:27 localhost sshd[25921]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:32 localhost sshd[25923]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:32 localhost sshd[25925]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:33 localhost sshd[25927]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:34 localhost sshd[25929]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:35 localhost sshd[25931]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:36 localhost sshd[25933]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:37 localhost sshd[25935]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:37 localhost sshd[25937]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:38 localhost sshd[25939]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:39 localhost sshd[25942]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:40 localhost sshd[25944]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:44 localhost sshd[25946]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:45 localhost sshd[25948]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:47 localhost sshd[25950]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:49 localhost sshd[25952]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:52 localhost sshd[25954]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:57 localhost sshd[25956]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:57 localhost sshd[25957]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:59 localhost sshd[25960]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:28:59 localhost sshd[25962]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:04 localhost sshd[25964]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:05 localhost sshd[25966]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:07 localhost sshd[25968]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:09 localhost sshd[25970]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:09 localhost sshd[25972]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:10 localhost sshd[25974]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:10 localhost sshd[25976]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:11 localhost sshd[25978]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:12 localhost sshd[25980]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:13 localhost sshd[25982]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:17 localhost sshd[25984]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:19 localhost sshd[25986]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:19 localhost sshd[25988]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:20 localhost sshd[25990]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:21 localhost sshd[25992]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:22 localhost sshd[25994]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:22 localhost sshd[25996]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:25 localhost sshd[25998]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:25 localhost sshd[25999]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:26 localhost sshd[26002]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:27 localhost sshd[26004]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:27 localhost sshd[26006]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:33 localhost sshd[26008]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:35 localhost sshd[26010]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:37 localhost sshd[26012]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:39 localhost sshd[26014]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:39 localhost sshd[26016]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:40 localhost sshd[26018]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:42 localhost sshd[26020]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:43 localhost sshd[26022]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:44 localhost sshd[26024]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:45 localhost sshd[26026]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:46 localhost sshd[26028]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:46 localhost sshd[26029]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:47 localhost sshd[26030]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:48 localhost sshd[26031]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:50 localhost sshd[26033]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:50 localhost sshd[26035]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:51 localhost sshd[26037]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:53 localhost sshd[26039]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:53 localhost sshd[26041]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:54 localhost sshd[26043]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:55 localhost sshd[26045]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:56 localhost sshd[26047]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:29:59 localhost sshd[26049]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:01 localhost sshd[26051]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:05 localhost sshd[26053]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:07 localhost sshd[26055]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:12 localhost sshd[26057]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:16 localhost sshd[26059]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:18 localhost sshd[26061]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:20 localhost sshd[26063]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:21 localhost sshd[26065]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:22 localhost sshd[26067]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:23 localhost sshd[26069]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:25 localhost sshd[26071]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:26 localhost sshd[26073]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:27 localhost sshd[26075]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:28 localhost sshd[26077]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:28 localhost sshd[26079]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:30 localhost sshd[26081]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:32 localhost sshd[26083]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:32 localhost sshd[26085]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:34 localhost sshd[26087]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:35 localhost sshd[26089]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:37 localhost sshd[26091]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:37 localhost sshd[26093]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:38 localhost sshd[26095]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:39 localhost sshd[26097]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:39 localhost sshd[26098]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:40 localhost sshd[26101]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:42 localhost sshd[26103]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:43 localhost sshd[26104]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:44 localhost sshd[26107]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:46 localhost sshd[26109]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:48 localhost sshd[26111]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:50 localhost sshd[26113]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:30:50 localhost sshd[26114]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:31:11 localhost sshd[26116]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:31:14 localhost sshd[26118]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:31:16 localhost sshd[26120]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:31:17 localhost sshd[26122]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:31:21 localhost sshd[26124]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:31:25 localhost sshd[26126]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:33:20 localhost sshd[26129]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:34:15 localhost sshd[26132]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:37:36 localhost sshd[26137]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:43:31 localhost sshd[26140]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:52:06 localhost sshd[26146]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:52:06 localhost sshd[26147]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:52:31 localhost sshd[26148]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:55:14 localhost sshd[26151]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:55:15 localhost systemd-logind[759]: New session 14 of user zuul. Oct 11 03:55:15 localhost systemd[1]: Started Session 14 of User zuul. Oct 11 03:55:15 localhost python3[26199]: ansible-ansible.legacy.ping Invoked with data=pong Oct 11 03:55:16 localhost python3[26244]: ansible-setup Invoked with gather_subset=['!facter', '!ohai'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 03:55:16 localhost python3[26264]: ansible-user Invoked with name=tripleo-admin generate_ssh_key=False state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005481012.ooo.test update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Oct 11 03:55:16 localhost systemd-journald[617]: Field hash table of /run/log/journal/0d75598033f175d0e781a840bff83569/system.journal has a fill level at 76.6 (255 of 333 items), suggesting rotation. Oct 11 03:55:16 localhost systemd-journald[617]: /run/log/journal/0d75598033f175d0e781a840bff83569/system.journal: Journal header limits reached or header out-of-date, rotating. Oct 11 03:55:16 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 03:55:16 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 03:55:17 localhost python3[26321]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/tripleo-admin follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:55:17 localhost python3[26364]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/tripleo-admin mode=288 owner=root group=root src=/home/zuul/.ansible/tmp/ansible-tmp-1760169317.2037911-83266-225354620107577/source _original_basename=tmpfqzlbxjr follow=False checksum=b3e7ecdcc699d217c6b083a91b07208207813d93 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:55:18 localhost python3[26394]: ansible-file Invoked with path=/home/tripleo-admin state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:55:18 localhost python3[26410]: ansible-file Invoked with path=/home/tripleo-admin/.ssh state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:55:19 localhost python3[26426]: ansible-file Invoked with path=/home/tripleo-admin/.ssh/authorized_keys state=touch owner=tripleo-admin group=tripleo-admin mode=384 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:55:20 localhost python3[26442]: ansible-lineinfile Invoked with path=/home/tripleo-admin/.ssh/authorized_keys line=ssh-rsa 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 zuul-build-sshkey#012 regexp=Generated by TripleO state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:55:20 localhost python3[26456]: ansible-ping Invoked with data=pong Oct 11 03:55:31 localhost sshd[26457]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:55:32 localhost systemd[1]: Created slice User Slice of UID 1002. Oct 11 03:55:32 localhost systemd[1]: Starting User Runtime Directory /run/user/1002... Oct 11 03:55:32 localhost systemd-logind[759]: New session 15 of user tripleo-admin. Oct 11 03:55:32 localhost systemd[1]: Finished User Runtime Directory /run/user/1002. Oct 11 03:55:32 localhost systemd[1]: Starting User Manager for UID 1002... Oct 11 03:55:32 localhost systemd[26461]: Queued start job for default target Main User Target. Oct 11 03:55:32 localhost systemd[26461]: Created slice User Application Slice. Oct 11 03:55:32 localhost systemd[26461]: Started Mark boot as successful after the user session has run 2 minutes. Oct 11 03:55:32 localhost systemd[26461]: Started Daily Cleanup of User's Temporary Directories. Oct 11 03:55:32 localhost systemd[26461]: Reached target Paths. Oct 11 03:55:32 localhost systemd[26461]: Reached target Timers. Oct 11 03:55:32 localhost systemd[26461]: Starting D-Bus User Message Bus Socket... Oct 11 03:55:32 localhost systemd[26461]: Starting Create User's Volatile Files and Directories... Oct 11 03:55:32 localhost systemd[26461]: Finished Create User's Volatile Files and Directories. Oct 11 03:55:32 localhost systemd[26461]: Listening on D-Bus User Message Bus Socket. Oct 11 03:55:32 localhost systemd[26461]: Reached target Sockets. Oct 11 03:55:32 localhost systemd[26461]: Reached target Basic System. Oct 11 03:55:32 localhost systemd[26461]: Reached target Main User Target. Oct 11 03:55:32 localhost systemd[26461]: Startup finished in 115ms. Oct 11 03:55:32 localhost systemd[1]: Started User Manager for UID 1002. Oct 11 03:55:32 localhost systemd[1]: Started Session 15 of User tripleo-admin. Oct 11 03:55:32 localhost python3[26522]: ansible-ansible.legacy.setup Invoked with gather_subset=['!all', 'min'] gather_timeout=45 filter=[] fact_path=/etc/ansible/facts.d Oct 11 03:55:37 localhost python3[26542]: ansible-selinux Invoked with policy=targeted state=enforcing configfile=/etc/selinux/config Oct 11 03:55:38 localhost python3[26558]: ansible-tempfile Invoked with state=file suffix=tmphosts prefix=ansible. path=None Oct 11 03:55:38 localhost python3[26606]: ansible-ansible.legacy.copy Invoked with remote_src=True src=/etc/hosts dest=/tmp/ansible.yf4rrfzltmphosts mode=preserve backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None local_follow=None checksum=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:55:39 localhost python3[26636]: ansible-blockinfile Invoked with state=absent path=/tmp/ansible.yf4rrfzltmphosts block= marker=# {mark} marker_begin=HEAT_HOSTS_START - Do not edit manually within this section! marker_end=HEAT_HOSTS_END create=False backup=False unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:55:40 localhost python3[26652]: ansible-blockinfile Invoked with create=True path=/tmp/ansible.yf4rrfzltmphosts insertbefore=BOF block=172.17.0.106 np0005481016.ooo.test np0005481016#012172.18.0.106 np0005481016.storage.ooo.test np0005481016.storage#012172.17.0.106 np0005481016.internalapi.ooo.test np0005481016.internalapi#012172.19.0.106 np0005481016.tenant.ooo.test np0005481016.tenant#012192.168.122.106 np0005481016.ctlplane.ooo.test np0005481016.ctlplane#012172.17.0.107 np0005481017.ooo.test np0005481017#012172.18.0.107 np0005481017.storage.ooo.test np0005481017.storage#012172.17.0.107 np0005481017.internalapi.ooo.test np0005481017.internalapi#012172.19.0.107 np0005481017.tenant.ooo.test np0005481017.tenant#012192.168.122.107 np0005481017.ctlplane.ooo.test np0005481017.ctlplane#012172.17.0.108 np0005481019.ooo.test np0005481019#012172.18.0.108 np0005481019.storage.ooo.test np0005481019.storage#012172.17.0.108 np0005481019.internalapi.ooo.test np0005481019.internalapi#012172.19.0.108 np0005481019.tenant.ooo.test np0005481019.tenant#012192.168.122.108 np0005481019.ctlplane.ooo.test np0005481019.ctlplane#012172.17.0.103 np0005481012.ooo.test np0005481012#012172.18.0.103 np0005481012.storage.ooo.test np0005481012.storage#012172.20.0.103 np0005481012.storagemgmt.ooo.test np0005481012.storagemgmt#012172.17.0.103 np0005481012.internalapi.ooo.test np0005481012.internalapi#012172.19.0.103 np0005481012.tenant.ooo.test np0005481012.tenant#012172.21.0.103 np0005481012.external.ooo.test np0005481012.external#012192.168.122.103 np0005481012.ctlplane.ooo.test np0005481012.ctlplane#012172.17.0.104 np0005481014.ooo.test np0005481014#012172.18.0.104 np0005481014.storage.ooo.test np0005481014.storage#012172.20.0.104 np0005481014.storagemgmt.ooo.test np0005481014.storagemgmt#012172.17.0.104 np0005481014.internalapi.ooo.test np0005481014.internalapi#012172.19.0.104 np0005481014.tenant.ooo.test np0005481014.tenant#012172.21.0.104 np0005481014.external.ooo.test np0005481014.external#012192.168.122.104 np0005481014.ctlplane.ooo.test np0005481014.ctlplane#012172.17.0.105 np0005481015.ooo.test np0005481015#012172.18.0.105 np0005481015.storage.ooo.test np0005481015.storage#012172.20.0.105 np0005481015.storagemgmt.ooo.test np0005481015.storagemgmt#012172.17.0.105 np0005481015.internalapi.ooo.test np0005481015.internalapi#012172.19.0.105 np0005481015.tenant.ooo.test np0005481015.tenant#012172.21.0.105 np0005481015.external.ooo.test np0005481015.external#012192.168.122.105 np0005481015.ctlplane.ooo.test np0005481015.ctlplane#012#012192.168.122.100 undercloud.ctlplane.ooo.test undercloud.ctlplane#012192.168.122.99 overcloud.ctlplane.ooo.test#012172.18.0.247 overcloud.storage.ooo.test#012172.20.0.124 overcloud.storagemgmt.ooo.test#012172.17.0.232 overcloud.internalapi.ooo.test#012172.21.0.199 overcloud.ooo.test#012 marker=# {mark} marker_begin=START_HOST_ENTRIES_FOR_STACK: overcloud marker_end=END_HOST_ENTRIES_FOR_STACK: overcloud state=present backup=False unsafe_writes=False insertafter=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:55:40 localhost python3[26668]: ansible-ansible.legacy.command Invoked with _raw_params=cp "/tmp/ansible.yf4rrfzltmphosts" "/etc/hosts" _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:55:41 localhost python3[26685]: ansible-file Invoked with path=/tmp/ansible.yf4rrfzltmphosts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:55:42 localhost python3[26701]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides rhosp-release _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:55:42 localhost python3[26718]: ansible-ansible.legacy.dnf Invoked with name=['rhosp-release'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 03:55:47 localhost python3[26737]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:55:47 localhost python3[26754]: ansible-ansible.legacy.dnf Invoked with name=['driverctl', 'lvm2', 'jq', 'nftables', 'openvswitch', 'openstack-heat-agents', 'openstack-selinux', 'os-net-config', 'python3-libselinux', 'python3-pyyaml', 'puppet-tripleo', 'rsync', 'tmpwatch', 'sysstat', 'iproute-tc'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 03:56:01 localhost systemd[1]: Reloading. Oct 11 03:56:01 localhost systemd-rc-local-generator[26948]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:56:01 localhost systemd-sysv-generator[26953]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:56:02 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:56:02 localhost systemd[1]: Listening on Device-mapper event daemon FIFOs. Oct 11 03:56:10 localhost systemd[1]: Reloading. Oct 11 03:56:10 localhost systemd-rc-local-generator[27017]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:56:10 localhost systemd-sysv-generator[27022]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:56:10 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:56:10 localhost systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Oct 11 03:56:10 localhost systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Oct 11 03:56:10 localhost systemd[1]: Reloading. Oct 11 03:56:10 localhost systemd-sysv-generator[27063]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:56:10 localhost systemd-rc-local-generator[27059]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:56:10 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:56:10 localhost systemd[1]: Listening on LVM2 poll daemon socket. Oct 11 03:56:37 localhost sshd[27777]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:56:58 localhost kernel: SELinux: Converting 2713 SID table entries... Oct 11 03:56:58 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 03:56:58 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 03:56:58 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 03:56:58 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 03:56:58 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 03:56:58 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 03:56:58 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 03:56:58 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=7 res=1 Oct 11 03:56:59 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 11 03:56:59 localhost systemd[1]: Starting man-db-cache-update.service... Oct 11 03:56:59 localhost systemd[1]: Reloading. Oct 11 03:56:59 localhost systemd-sysv-generator[27968]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:56:59 localhost systemd-rc-local-generator[27964]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:56:59 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:56:59 localhost systemd[1]: Queuing reload/restart jobs for marked units… Oct 11 03:56:59 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 11 03:56:59 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 11 03:56:59 localhost systemd[1]: Finished man-db-cache-update.service. Oct 11 03:56:59 localhost systemd[1]: run-r53ed65042bbe42298cc28ac00f5b1ebf.service: Deactivated successfully. Oct 11 03:56:59 localhost systemd[1]: run-r46b14d93e5a0470aabca2873f7313c77.service: Deactivated successfully. Oct 11 03:57:02 localhost python3[28824]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -V driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:03 localhost python3[28963]: ansible-ansible.legacy.systemd Invoked with name=openvswitch enabled=True state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 03:57:03 localhost systemd[1]: Reloading. Oct 11 03:57:03 localhost systemd-sysv-generator[28994]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:57:03 localhost systemd-rc-local-generator[28990]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:57:03 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:57:05 localhost python3[29016]: ansible-file Invoked with path=/var/lib/heat-config/tripleo-config-download state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:05 localhost python3[29032]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides openstack-network-scripts _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:06 localhost python3[29049]: ansible-systemd Invoked with name=NetworkManager enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Oct 11 03:57:07 localhost python3[29067]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=dns value=none backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:07 localhost python3[29085]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=rc-manager value=unmanaged backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:08 localhost python3[29103]: ansible-ansible.legacy.systemd Invoked with name=NetworkManager state=reloaded daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 03:57:08 localhost systemd[1]: Reloading Network Manager... Oct 11 03:57:08 localhost NetworkManager[5963]: [1760169428.1184] audit: op="reload" arg="0" pid=29106 uid=0 result="success" Oct 11 03:57:08 localhost NetworkManager[5963]: [1760169428.1193] config: signal: SIGHUP,config-files,values,values-user,no-auto-default,dns-mode,rc-manager (/etc/NetworkManager/NetworkManager.conf (lib: 00-server.conf) (run: 15-carrier-timeout.conf)) Oct 11 03:57:08 localhost NetworkManager[5963]: [1760169428.1194] dns-mgr: init: dns=none,systemd-resolved rc-manager=unmanaged Oct 11 03:57:08 localhost systemd[1]: Reloaded Network Manager. Oct 11 03:57:08 localhost python3[29122]: ansible-ansible.legacy.command Invoked with _raw_params=ln -f -s /usr/share/openstack-puppet/modules/* /etc/puppet/modules/ _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:09 localhost python3[29139]: ansible-stat Invoked with path=/usr/bin/ansible-playbook follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 03:57:09 localhost python3[29157]: ansible-stat Invoked with path=/usr/bin/ansible-playbook-3 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 03:57:09 localhost python3[29173]: ansible-file Invoked with state=link src=/usr/bin/ansible-playbook path=/usr/bin/ansible-playbook-3 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:10 localhost python3[29189]: ansible-tempfile Invoked with state=file prefix=ansible. suffix= path=None Oct 11 03:57:11 localhost python3[29205]: ansible-stat Invoked with path=/etc/ssh/ssh_known_hosts follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 03:57:11 localhost python3[29221]: ansible-blockinfile Invoked with path=/tmp/ansible.y0swxj2o block=[192.168.122.106]*,[np0005481016.ctlplane.ooo.test]*,[172.17.0.106]*,[np0005481016.internalapi.ooo.test]*,[172.18.0.106]*,[np0005481016.storage.ooo.test]*,[172.19.0.106]*,[np0005481016.tenant.ooo.test]*,[np0005481016.ooo.test]*,[np0005481016]* ssh-rsa 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#012[192.168.122.107]*,[np0005481017.ctlplane.ooo.test]*,[172.17.0.107]*,[np0005481017.internalapi.ooo.test]*,[172.18.0.107]*,[np0005481017.storage.ooo.test]*,[172.19.0.107]*,[np0005481017.tenant.ooo.test]*,[np0005481017.ooo.test]*,[np0005481017]* ssh-rsa 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#012[192.168.122.108]*,[np0005481019.ctlplane.ooo.test]*,[172.17.0.108]*,[np0005481019.internalapi.ooo.test]*,[172.18.0.108]*,[np0005481019.storage.ooo.test]*,[172.19.0.108]*,[np0005481019.tenant.ooo.test]*,[np0005481019.ooo.test]*,[np0005481019]* ssh-rsa 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#012[192.168.122.103]*,[np0005481012.ctlplane.ooo.test]*,[172.21.0.103]*,[np0005481012.external.ooo.test]*,[172.17.0.103]*,[np0005481012.internalapi.ooo.test]*,[172.18.0.103]*,[np0005481012.storage.ooo.test]*,[172.20.0.103]*,[np0005481012.storagemgmt.ooo.test]*,[172.19.0.103]*,[np0005481012.tenant.ooo.test]*,[np0005481012.ooo.test]*,[np0005481012]* ssh-rsa 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#012[192.168.122.104]*,[np0005481014.ctlplane.ooo.test]*,[172.21.0.104]*,[np0005481014.external.ooo.test]*,[172.17.0.104]*,[np0005481014.internalapi.ooo.test]*,[172.18.0.104]*,[np0005481014.storage.ooo.test]*,[172.20.0.104]*,[np0005481014.storagemgmt.ooo.test]*,[172.19.0.104]*,[np0005481014.tenant.ooo.test]*,[np0005481014.ooo.test]*,[np0005481014]* ssh-rsa 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#012[192.168.122.105]*,[np0005481015.ctlplane.ooo.test]*,[172.21.0.105]*,[np0005481015.external.ooo.test]*,[172.17.0.105]*,[np0005481015.internalapi.ooo.test]*,[172.18.0.105]*,[np0005481015.storage.ooo.test]*,[172.20.0.105]*,[np0005481015.storagemgmt.ooo.test]*,[172.19.0.105]*,[np0005481015.tenant.ooo.test]*,[np0005481015.ooo.test]*,[np0005481015]* ssh-rsa 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#012 create=True state=present marker=# {mark} ANSIBLE MANAGED BLOCK backup=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:12 localhost python3[29237]: ansible-ansible.legacy.command Invoked with _raw_params=cat '/tmp/ansible.y0swxj2o' > /etc/ssh/ssh_known_hosts _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:12 localhost python3[29255]: ansible-file Invoked with path=/tmp/ansible.y0swxj2o state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:13 localhost python3[29271]: ansible-file Invoked with path=/var/log/journal state=directory mode=0750 owner=root group=root setype=var_log_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Oct 11 03:57:14 localhost python3[29287]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active cloud-init.service || systemctl is-enabled cloud-init.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:14 localhost python3[29305]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline | grep -q cloud-init=disabled _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:14 localhost python3[29324]: ansible-community.general.cloud_init_data_facts Invoked with filter=status Oct 11 03:57:17 localhost python3[29461]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:17 localhost python3[29478]: ansible-ansible.legacy.dnf Invoked with name=['tuned', 'tuned-profiles-cpu-partitioning'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 03:57:20 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Oct 11 03:57:20 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Oct 11 03:57:21 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 11 03:57:21 localhost systemd[1]: Starting man-db-cache-update.service... Oct 11 03:57:21 localhost systemd[1]: Reloading. Oct 11 03:57:21 localhost systemd-sysv-generator[29551]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:57:21 localhost systemd-rc-local-generator[29547]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:57:21 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:57:21 localhost systemd[1]: Queuing reload/restart jobs for marked units… Oct 11 03:57:21 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Oct 11 03:57:21 localhost systemd[1]: tuned.service: Deactivated successfully. Oct 11 03:57:21 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Oct 11 03:57:21 localhost systemd[1]: tuned.service: Consumed 1.672s CPU time. Oct 11 03:57:21 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Oct 11 03:57:21 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 11 03:57:21 localhost systemd[1]: Finished man-db-cache-update.service. Oct 11 03:57:21 localhost systemd[1]: run-r658f5e7b144348d3b618317d6071debd.service: Deactivated successfully. Oct 11 03:57:22 localhost systemd[1]: Started Dynamic System Tuning Daemon. Oct 11 03:57:23 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 11 03:57:23 localhost systemd[1]: Starting man-db-cache-update.service... Oct 11 03:57:23 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 11 03:57:23 localhost systemd[1]: Finished man-db-cache-update.service. Oct 11 03:57:23 localhost systemd[1]: run-reacc4b19506247089f026074491a94f8.service: Deactivated successfully. Oct 11 03:57:24 localhost python3[29924]: ansible-systemd Invoked with name=tuned state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 03:57:24 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Oct 11 03:57:24 localhost systemd[1]: tuned.service: Deactivated successfully. Oct 11 03:57:24 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Oct 11 03:57:24 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Oct 11 03:57:25 localhost systemd[1]: Started Dynamic System Tuning Daemon. Oct 11 03:57:26 localhost python3[30119]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:26 localhost python3[30136]: ansible-slurp Invoked with src=/etc/tuned/active_profile Oct 11 03:57:27 localhost python3[30152]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 03:57:27 localhost python3[30168]: ansible-ansible.legacy.command Invoked with _raw_params=tuned-adm profile throughput-performance _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:29 localhost python3[30188]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:29 localhost python3[30205]: ansible-stat Invoked with path=/var/lib/config-data/puppet-generated/nova_libvirt/etc/nova/nova.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 03:57:32 localhost python3[30221]: ansible-replace Invoked with regexp=TRIPLEO_HEAT_TEMPLATE_KERNEL_ARGS dest=/etc/default/grub replace= path=/etc/default/grub backup=False encoding=utf-8 unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:38 localhost python3[30237]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:38 localhost python3[30285]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:39 localhost python3[30330]: ansible-ansible.legacy.copy Invoked with mode=384 dest=/etc/puppet/hiera.yaml src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169458.4287052-88667-7259730371147/source _original_basename=tmpvsz_dzjr follow=False checksum=aaf3699defba931d532f4955ae152f505046749a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:39 localhost systemd[26461]: Starting Mark boot as successful... Oct 11 03:57:39 localhost systemd[26461]: Finished Mark boot as successful. Oct 11 03:57:39 localhost python3[30361]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:40 localhost python3[30409]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:40 localhost python3[30452]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169460.0168347-88891-255747702962652/source dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json follow=False checksum=95752773bec5e42a0bd51fd13d9914ae8e709915 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:41 localhost python3[30514]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:41 localhost python3[30557]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169460.9756365-89038-252344472089396/source dest=/etc/puppet/hieradata/bootstrap_node.json mode=None follow=False _original_basename=bootstrap_node.j2 checksum=fbf18c0e936e3bb6489f6593de0653bb642f24c1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:42 localhost python3[30619]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:42 localhost python3[30662]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169461.9025073-89038-70952055100777/source dest=/etc/puppet/hieradata/vip_data.json mode=None follow=False _original_basename=vip_data.j2 checksum=a861c69a8e07ecad327dd2b56e101b87bc8adc07 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:43 localhost python3[30724]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:43 localhost python3[30767]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169462.9693418-89038-276665618380636/source dest=/etc/puppet/hieradata/net_ip_map.json mode=None follow=False _original_basename=net_ip_map.j2 checksum=58a6ffe95d92c6d1cd6a9c438fa59ae801d53929 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:44 localhost python3[30829]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:44 localhost python3[30872]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169464.1200438-89038-88777551700845/source dest=/etc/puppet/hieradata/cloud_domain.json mode=None follow=False _original_basename=cloud_domain.j2 checksum=64f5f309f5137b9e0913cbf22857157ecfa0f1f1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:45 localhost python3[30934]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:45 localhost python3[30977]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169465.1046982-89038-159076513203606/source dest=/etc/puppet/hieradata/fqdn.json mode=None follow=False _original_basename=fqdn.j2 checksum=73e3ec3f3988b44a65c180e007fd3ccb7edf3e4f backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:46 localhost python3[31039]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:46 localhost python3[31082]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169466.0814743-89038-270065558752356/source dest=/etc/puppet/hieradata/service_names.json mode=None follow=False _original_basename=service_names.j2 checksum=f3a297f9489dbabd957eb904b4140ce21e05b558 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:47 localhost python3[31144]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:47 localhost python3[31187]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169467.0025377-89038-31635542452001/source dest=/etc/puppet/hieradata/service_configs.json mode=None follow=False _original_basename=service_configs.j2 checksum=917364b04610706fe7dceb5fbb208989af47e99d backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:48 localhost python3[31249]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:48 localhost python3[31292]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169467.938592-89038-163091297605826/source dest=/etc/puppet/hieradata/extraconfig.json mode=None follow=False _original_basename=extraconfig.j2 checksum=5f36b2ea290645ee34d943220a14b54ee5ea5be5 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:49 localhost python3[31354]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:49 localhost python3[31397]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169468.8868768-89038-68113597424870/source dest=/etc/puppet/hieradata/role_extraconfig.json mode=None follow=False _original_basename=role_extraconfig.j2 checksum=ad2ff5cbdfc5332b5cb47860d7f73fa8fd81a43a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:50 localhost python3[31459]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:50 localhost python3[31502]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169469.9071498-89038-268454082473623/source dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json mode=None follow=False _original_basename=ovn_chassis_mac_map.j2 checksum=e8e39ffaf780e45f2680c5123aa1707ef15aa9e8 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:51 localhost python3[31532]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 03:57:52 localhost python3[31580]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:52 localhost python3[31623]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/ansible_managed.json owner=root group=root mode=0644 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169471.6619303-90613-19056842858492/source _original_basename=tmpg937einb follow=False checksum=bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:57 localhost python3[31653]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_default_ipv4'] gather_timeout=10 fact_path=/etc/ansible/facts.d Oct 11 03:57:57 localhost python3[31714]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 38.102.83.1 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:02 localhost python3[31731]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 192.168.122.10 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:07 localhost python3[31748]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 192.168.122.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:07 localhost python3[31771]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.18.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:08 localhost python3[31794]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.20.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:09 localhost python3[31817]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.17.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:09 localhost python3[31840]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.19.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:10 localhost python3[31863]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.21.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:59:00 localhost python3[31886]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:00 localhost python3[31934]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:00 localhost python3[31952]: ansible-ansible.legacy.file Invoked with mode=384 dest=/etc/puppet/hiera.yaml _original_basename=tmp1muna2w_ recurse=False state=file path=/etc/puppet/hiera.yaml force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:01 localhost python3[31982]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:02 localhost python3[32030]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:02 localhost python3[32048]: ansible-ansible.legacy.file Invoked with dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json recurse=False state=file path=/etc/puppet/hieradata/all_nodes.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:02 localhost python3[32110]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:03 localhost python3[32128]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/bootstrap_node.json _original_basename=bootstrap_node.j2 recurse=False state=file path=/etc/puppet/hieradata/bootstrap_node.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:03 localhost python3[32190]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:04 localhost python3[32208]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/vip_data.json _original_basename=vip_data.j2 recurse=False state=file path=/etc/puppet/hieradata/vip_data.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:04 localhost python3[32270]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:05 localhost python3[32288]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/net_ip_map.json _original_basename=net_ip_map.j2 recurse=False state=file path=/etc/puppet/hieradata/net_ip_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:05 localhost python3[32350]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:05 localhost python3[32368]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/cloud_domain.json _original_basename=cloud_domain.j2 recurse=False state=file path=/etc/puppet/hieradata/cloud_domain.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:06 localhost python3[32430]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:06 localhost python3[32448]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/fqdn.json _original_basename=fqdn.j2 recurse=False state=file path=/etc/puppet/hieradata/fqdn.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:07 localhost python3[32510]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:07 localhost python3[32528]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_names.json _original_basename=service_names.j2 recurse=False state=file path=/etc/puppet/hieradata/service_names.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:08 localhost python3[32590]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:08 localhost python3[32608]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_configs.json _original_basename=service_configs.j2 recurse=False state=file path=/etc/puppet/hieradata/service_configs.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:08 localhost python3[32670]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:09 localhost python3[32688]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/extraconfig.json _original_basename=extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:09 localhost python3[32750]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:09 localhost python3[32768]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/role_extraconfig.json _original_basename=role_extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/role_extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:10 localhost python3[32830]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:10 localhost python3[32848]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json _original_basename=ovn_chassis_mac_map.j2 recurse=False state=file path=/etc/puppet/hieradata/ovn_chassis_mac_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:11 localhost python3[32878]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 03:59:12 localhost python3[32926]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:12 localhost python3[32944]: ansible-ansible.legacy.file Invoked with owner=root group=root mode=0644 dest=/etc/puppet/hieradata/ansible_managed.json _original_basename=tmp3tat05lv recurse=False state=file path=/etc/puppet/hieradata/ansible_managed.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:15 localhost python3[32974]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 03:59:20 localhost python3[32991]: ansible-ansible.builtin.systemd Invoked with name=iptables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 03:59:20 localhost python3[33009]: ansible-ansible.builtin.systemd Invoked with name=ip6tables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 03:59:21 localhost python3[33027]: ansible-ansible.builtin.systemd Invoked with name=nftables state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 03:59:21 localhost systemd[1]: Reloading. Oct 11 03:59:21 localhost systemd-rc-local-generator[33054]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:59:21 localhost systemd-sysv-generator[33061]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:59:21 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:59:21 localhost systemd[1]: Starting Netfilter Tables... Oct 11 03:59:21 localhost systemd[1]: Finished Netfilter Tables. Oct 11 03:59:22 localhost python3[33117]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/iptables.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:22 localhost python3[33160]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/iptables.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169561.7748067-94674-252686299609243/source _original_basename=iptables.nft follow=False checksum=ede9860c99075946a7bc827210247aac639bc84a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:22 localhost python3[33190]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/iptables.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:59:23 localhost python3[33208]: ansible-ansible.legacy.command Invoked with _raw_params=nft -j list ruleset _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:59:24 localhost python3[33257]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:24 localhost python3[33300]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169563.8345942-94899-152633183516003/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:25 localhost python3[33362]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-update-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:25 localhost python3[33405]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-update-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169564.8657975-95090-176275031805983/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:26 localhost python3[33467]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-flushes.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:26 localhost python3[33510]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-flushes.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169566.029521-95241-155807851161423/source mode=None follow=False _original_basename=flush-chain.j2 checksum=e8e7b8db0d61a7fe393441cc91613f470eb34a6e backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:27 localhost python3[33572]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-chains.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:27 localhost python3[33615]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-chains.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169567.0400252-95385-204586861247495/source mode=None follow=False _original_basename=chains.j2 checksum=e60ee651f5014e83924f4e901ecc8e25b1906610 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:29 localhost python3[33677]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-rules.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:29 localhost python3[33720]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-rules.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169568.0759711-95522-27490116754591/source mode=None follow=False _original_basename=ruleset.j2 checksum=f3487dfc0a90bd6214637cfa4d839c408ea37185 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:30 localhost python3[33750]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-chains.nft /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft /etc/nftables/tripleo-jumps.nft | nft -c -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:59:31 localhost python3[33815]: ansible-ansible.builtin.blockinfile Invoked with path=/etc/sysconfig/nftables.conf backup=False validate=nft -c -f %s block=include "/etc/nftables/iptables.nft"#012include "/etc/nftables/tripleo-chains.nft"#012include "/etc/nftables/tripleo-rules.nft"#012include "/etc/nftables/tripleo-jumps.nft"#012 state=present marker=# {mark} ANSIBLE MANAGED BLOCK create=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:31 localhost python3[33832]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/tripleo-chains.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:59:32 localhost python3[33849]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft | nft -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:59:32 localhost python3[33868]: ansible-file Invoked with mode=0750 path=/var/log/containers/ceilometer setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:32 localhost python3[33884]: ansible-seboolean Invoked with name=virt_sandbox_use_netlink persistent=True state=True ignore_selinux_state=False Oct 11 03:59:33 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=8 res=1 Oct 11 03:59:33 localhost python3[33904]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:34 localhost python3[33920]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/cinder-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:34 localhost python3[33936]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/cinder(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Oct 11 03:59:35 localhost kernel: SELinux: Converting 2717 SID table entries... Oct 11 03:59:35 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 03:59:35 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 03:59:35 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 03:59:35 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 03:59:35 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 03:59:35 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 03:59:35 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 03:59:35 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=9 res=1 Oct 11 03:59:35 localhost python3[33957]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:36 localhost python3[33973]: ansible-file Invoked with path=/var/lib/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:36 localhost python3[33989]: ansible-file Invoked with path=/var/lib/tripleo-config/ceph state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:36 localhost python3[34005]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:37 localhost python3[34021]: ansible-ansible.legacy.dnf Invoked with name=['lvm2'] state=latest allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 03:59:40 localhost python3[34038]: ansible-ansible.legacy.command Invoked with creates=/var/lib/cinder/cinder-volumes _raw_params=dd if=/dev/zero of=/var/lib/cinder/cinder-volumes bs=1 count=0 seek=20480M _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 11 03:59:40 localhost python3[34055]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=exit_code=0#012existing_device=$(losetup -j /var/lib/cinder/cinder-volumes -l -n -O NAME)#012if [[ -z "${existing_device}" ]]; then#012 losetup -f /var/lib/cinder/cinder-volumes --show#012 exit_code=2#012else#012 echo ${existing_device%$'\n'*}#012fi#012exit ${exit_code} _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Oct 11 03:59:40 localhost kernel: loop: module loaded Oct 11 03:59:40 localhost kernel: loop0: detected capacity change from 0 to 41943040 Oct 11 03:59:41 localhost python3[34080]: ansible-community.general.lvg Invoked with pvs=['/dev/loop0'] state=present vg=cinder-volumes pesize=4 pv_options= pvresize=False vg_options= force=False Oct 11 03:59:41 localhost lvm[34084]: PV /dev/loop0 not used. Oct 11 03:59:41 localhost python3[34133]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/cinder-lvm-losetup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:42 localhost python3[34176]: ansible-ansible.legacy.copy Invoked with dest=/etc/systemd/system/cinder-lvm-losetup.service src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169581.6348221-96481-269053040545210/source _original_basename=tmpk3heb25w follow=False checksum=b96c2f9cc51ddf9c35f8cfb4cbac820751f42aef backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:42 localhost python3[34206]: ansible-systemd Invoked with daemon_reload=True enabled=True name=cinder-lvm-losetup daemon_reexec=False scope=system no_block=False state=None force=None masked=None Oct 11 03:59:42 localhost systemd[1]: Reloading. Oct 11 03:59:43 localhost systemd-rc-local-generator[34227]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:59:43 localhost systemd-sysv-generator[34232]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:59:43 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:59:43 localhost systemd[1]: Reloading. Oct 11 03:59:43 localhost systemd-sysv-generator[34270]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:59:43 localhost systemd-rc-local-generator[34266]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:59:43 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:59:43 localhost python3[34296]: ansible-file Invoked with mode=0750 path=/var/log/containers/collectd setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:44 localhost python3[34312]: ansible-file Invoked with mode=0755 path=/var/lib/container-user-scripts/ setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:44 localhost python3[34328]: ansible-file Invoked with mode=0750 path=/var/log/containers/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:44 localhost python3[34344]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:45 localhost python3[34360]: ansible-file Invoked with path=/var/lib/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:45 localhost python3[34376]: ansible-file Invoked with mode=0750 path=/var/log/containers/haproxy setype=var_log_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:46 localhost python3[34392]: ansible-file Invoked with path=/var/lib/haproxy setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:51 localhost python3[34538]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:51 localhost python3[34554]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:52 localhost python3[34570]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:52 localhost python3[34586]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api-cfn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:53 localhost python3[34602]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:53 localhost python3[34618]: ansible-file Invoked with mode=0750 path=/var/log/containers/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:53 localhost python3[34634]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:53 localhost python3[34650]: ansible-file Invoked with path=/var/www setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:54 localhost python3[34666]: ansible-file Invoked with mode=01777 path=/var/tmp/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:54 localhost python3[34714]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/var-tmp-horizon.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:55 localhost python3[34757]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/var-tmp-horizon.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169594.4865835-97356-186645297001323/source _original_basename=tmp8ptre9r3 follow=False checksum=804a78abbf39204f4c8abd5e4269fa10d8cb9df3 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:55 localhost python3[34787]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Oct 11 03:59:56 localhost kernel: SELinux: Converting 2721 SID table entries... Oct 11 03:59:56 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 03:59:56 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 03:59:56 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 03:59:56 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 03:59:56 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 03:59:56 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 03:59:56 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 03:59:56 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=10 res=1 Oct 11 03:59:57 localhost python3[34808]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/target(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Oct 11 03:59:57 localhost kernel: SELinux: Converting 2721 SID table entries... Oct 11 03:59:57 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 03:59:57 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 03:59:57 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 03:59:57 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 03:59:57 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 03:59:57 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 03:59:57 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 03:59:58 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=11 res=1 Oct 11 03:59:58 localhost python3[34829]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Oct 11 03:59:58 localhost kernel: SELinux: Converting 2721 SID table entries... Oct 11 03:59:58 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 03:59:58 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 03:59:58 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 03:59:58 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 03:59:58 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 03:59:58 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 03:59:59 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 03:59:59 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=12 res=1 Oct 11 03:59:59 localhost python3[34850]: ansible-file Invoked with path=/etc/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:59 localhost python3[34866]: ansible-file Invoked with path=/etc/target setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:00 localhost python3[34882]: ansible-file Invoked with path=/var/lib/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:00 localhost python3[34898]: ansible-stat Invoked with path=/lib/systemd/system/iscsid.socket follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 04:00:00 localhost python3[34914]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-enabled --quiet iscsi.service _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:00:01 localhost python3[34931]: ansible-ansible.legacy.dnf Invoked with name=['dracut-config-generic'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 04:00:07 localhost python3[34948]: ansible-file Invoked with path=/etc/modules-load.d state=directory mode=493 owner=root group=root setype=etc_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:07 localhost python3[34996]: ansible-ansible.legacy.stat Invoked with path=/etc/modules-load.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:00:08 localhost python3[35039]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169607.4386084-98466-166153618949410/source dest=/etc/modules-load.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-modprobe.conf.j2 checksum=8021efe01721d8fa8cab46b95c00ec1be6dbb9d0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:08 localhost python3[35069]: ansible-systemd Invoked with name=systemd-modules-load.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 04:00:08 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 11 04:00:08 localhost systemd[1]: Stopped Load Kernel Modules. Oct 11 04:00:08 localhost systemd[1]: Stopping Load Kernel Modules... Oct 11 04:00:08 localhost systemd[1]: Starting Load Kernel Modules... Oct 11 04:00:08 localhost kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 11 04:00:08 localhost kernel: Bridge firewalling registered Oct 11 04:00:08 localhost systemd-modules-load[35072]: Inserted module 'br_netfilter' Oct 11 04:00:08 localhost systemd-modules-load[35072]: Module 'msr' is built in Oct 11 04:00:08 localhost systemd[1]: Finished Load Kernel Modules. Oct 11 04:00:09 localhost python3[35123]: ansible-ansible.legacy.stat Invoked with path=/etc/sysctl.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:00:09 localhost python3[35166]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169608.9707472-98548-40941683565360/source dest=/etc/sysctl.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-sysctl.conf.j2 checksum=cddb9401fdafaaf28a4a94b98448f98ae93c94c9 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:10 localhost python3[35196]: ansible-sysctl Invoked with name=fs.inotify.max_user_instances value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:10 localhost python3[35214]: ansible-sysctl Invoked with name=kernel.pid_max value=1048576 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:10 localhost python3[35232]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-arptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:11 localhost python3[35249]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-ip6tables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:11 localhost python3[35266]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-iptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:11 localhost python3[35283]: ansible-sysctl Invoked with name=net.ipv4.conf.all.rp_filter value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:11 localhost python3[35301]: ansible-sysctl Invoked with name=net.ipv4.ip_forward value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:12 localhost python3[35319]: ansible-sysctl Invoked with name=net.ipv4.ip_local_reserved_ports value=35357,49000-49001 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:12 localhost python3[35337]: ansible-sysctl Invoked with name=net.ipv4.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:12 localhost python3[35355]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh1 value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:13 localhost python3[35373]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh2 value=2048 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:13 localhost python3[35391]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh3 value=4096 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:13 localhost python3[35409]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:14 localhost python3[35426]: ansible-sysctl Invoked with name=net.ipv6.conf.all.forwarding value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:14 localhost python3[35443]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:14 localhost python3[35460]: ansible-sysctl Invoked with name=net.ipv6.conf.lo.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:14 localhost python3[35477]: ansible-sysctl Invoked with name=net.ipv6.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:15 localhost python3[35495]: ansible-systemd Invoked with name=systemd-sysctl.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 04:00:15 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 11 04:00:15 localhost systemd[1]: Stopped Apply Kernel Variables. Oct 11 04:00:15 localhost systemd[1]: Stopping Apply Kernel Variables... Oct 11 04:00:15 localhost systemd[1]: Starting Apply Kernel Variables... Oct 11 04:00:15 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 11 04:00:15 localhost systemd[1]: Finished Apply Kernel Variables. Oct 11 04:00:15 localhost python3[35515]: ansible-file Invoked with mode=0750 path=/var/log/containers/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:16 localhost python3[35531]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:16 localhost python3[35547]: ansible-stat Invoked with path=/etc/openldap/certs/certs_valid follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 04:00:16 localhost python3[35563]: ansible-stat Invoked with path=/etc/openldap/certs/cert9.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 04:00:17 localhost python3[35579]: ansible-stat Invoked with path=/etc/openldap/certs/key4.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 04:00:17 localhost python3[35595]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:17 localhost python3[35611]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/manila-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:18 localhost python3[35627]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:18 localhost python3[35643]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:18 localhost python3[35659]: ansible-file Invoked with path=/var/lib/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:19 localhost python3[35675]: ansible-file Invoked with mode=0750 path=/var/log/containers/memcached setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:19 localhost python3[35691]: ansible-file Invoked with mode=0750 path=/var/log/containers/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:19 localhost python3[35707]: ansible-file Invoked with path=/var/lib/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:20 localhost python3[35723]: ansible-file Invoked with mode=0750 path=/var/log/containers/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:20 localhost python3[35739]: ansible-file Invoked with path=/var/lib/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:20 localhost python3[35755]: ansible-file Invoked with mode=0750 path=/var/log/mariadb setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:21 localhost python3[35771]: ansible-file Invoked with mode=0750 path=/var/log/containers/neutron setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:21 localhost python3[35787]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/neutron-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:21 localhost python3[35803]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:22 localhost python3[35819]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:22 localhost python3[35835]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:22 localhost python3[35851]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:23 localhost python3[35867]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-metadata setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:23 localhost python3[35883]: ansible-group Invoked with gid=107 name=qemu state=present system=False local=False non_unique=False Oct 11 04:00:23 localhost python3[35905]: ansible-user Invoked with comment=qemu user group=qemu name=qemu shell=/sbin/nologin state=present uid=107 non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005481012.ooo.test update_password=always groups=None home=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Oct 11 04:00:24 localhost python3[35929]: ansible-seboolean Invoked with name=logrotate_read_inside_containers persistent=True state=True ignore_selinux_state=False Oct 11 04:00:25 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=13 res=1 Oct 11 04:00:25 localhost python3[35949]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:25 localhost python3[35965]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:25 localhost python3[35981]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:26 localhost python3[35997]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:26 localhost python3[36045]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/neutron-cleanup follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:00:26 localhost python3[36088]: ansible-ansible.legacy.copy Invoked with dest=/usr/libexec/neutron-cleanup force=True mode=0755 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169626.3108618-99705-115115897528822/source _original_basename=tmpe1r7gbuk follow=False checksum=f9cc7d1e91fbae49caa7e35eb2253bba146a73b4 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:27 localhost python3[36150]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/neutron-cleanup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:00:27 localhost python3[36193]: ansible-ansible.legacy.copy Invoked with dest=/usr/lib/systemd/system/neutron-cleanup.service force=True src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169627.2104278-99802-9317855857977/source _original_basename=tmpjpb0g5m9 follow=False checksum=6b6cd9f074903a28d054eb530a10c7235d0c39fc backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:28 localhost python3[36223]: ansible-ansible.legacy.systemd Invoked with enabled=True name=neutron-cleanup daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Oct 11 04:00:29 localhost systemd[1]: Reloading. Oct 11 04:00:29 localhost systemd-rc-local-generator[36249]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 04:00:29 localhost systemd-sysv-generator[36255]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 04:00:29 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 04:00:30 localhost python3[36277]: ansible-ansible.builtin.lineinfile Invoked with path=/etc/systemd/logind.conf regexp=^\s*#?\s*HandlePowerKey\s*=.* state=absent backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None line=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:30 localhost python3[36293]: ansible-ansible.builtin.lineinfile Invoked with line=HandlePowerKey=ignore path=/etc/systemd/logind.conf regexp=^#?HandlePowerKey state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:31 localhost python3[36309]: ansible-ansible.legacy.systemd Invoked with name=systemd-logind state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 04:00:31 localhost systemd[1]: Stopping User Login Management... Oct 11 04:00:31 localhost systemd[1]: systemd-logind.service: Deactivated successfully. Oct 11 04:00:31 localhost systemd[1]: Stopped User Login Management. Oct 11 04:00:31 localhost systemd[1]: Starting Load Kernel Module drm... Oct 11 04:00:31 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 11 04:00:31 localhost systemd[1]: Finished Load Kernel Module drm. Oct 11 04:00:31 localhost systemd[1]: Starting User Login Management... Oct 11 04:00:31 localhost systemd-logind[36317]: New seat seat0. Oct 11 04:00:31 localhost systemd-logind[36317]: Watching system buttons on /dev/input/event0 (Power Button) Oct 11 04:00:31 localhost systemd-logind[36317]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Oct 11 04:00:31 localhost systemd[1]: Started User Login Management. Oct 11 04:00:31 localhost systemd-logind[36317]: New session 15 of user tripleo-admin. Oct 11 04:00:31 localhost systemd-logind[36317]: New session 14 of user zuul. Oct 11 04:00:31 localhost python3[36333]: ansible-file Invoked with mode=0750 path=/var/log/containers/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:32 localhost python3[36349]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:32 localhost python3[36365]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/rabbitmq(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Oct 11 04:00:33 localhost kernel: SELinux: Converting 2721 SID table entries... Oct 11 04:00:33 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 04:00:33 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 04:00:33 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 04:00:33 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 04:00:33 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 04:00:33 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 04:00:33 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 04:00:33 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=14 res=1 Oct 11 04:00:33 localhost python3[36388]: ansible-file Invoked with path=/var/lib/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:34 localhost python3[36404]: ansible-file Invoked with mode=0750 path=/var/log/containers/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:34 localhost python3[36420]: ansible-ansible.legacy.command Invoked with _raw_params=echo 'export ERL_EPMD_ADDRESS=127.0.0.1' > /etc/rabbitmq/rabbitmq-env.conf#012echo 'export ERL_EPMD_PORT=4370' >> /etc/rabbitmq/rabbitmq-env.conf#012for pid in $(pgrep epmd --ns 1 --nslist pid); do kill $pid; done#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:00:35 localhost python3[36438]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 04:00:39 localhost python3[36455]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_interfaces'] gather_timeout=10 fact_path=/etc/ansible/facts.d Oct 11 04:00:39 localhost systemd[26461]: Created slice User Background Tasks Slice. Oct 11 04:00:39 localhost systemd[26461]: Starting Cleanup of User's Temporary Files and Directories... Oct 11 04:00:39 localhost systemd[26461]: Finished Cleanup of User's Temporary Files and Directories. Oct 11 04:00:40 localhost python3[36517]: ansible-file Invoked with path=/etc/containers/networks state=directory recurse=True mode=493 owner=root group=root force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:40 localhost python3[36533]: ansible-ansible.legacy.command Invoked with _raw_params=podman network inspect podman#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:00:40 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 04:00:41 localhost python3[36592]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/networks/podman.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:00:41 localhost python3[36635]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169640.69317-100719-71416598593064/source dest=/etc/containers/networks/podman.json mode=0644 owner=root group=root follow=False _original_basename=podman_network_config.j2 checksum=f8abefd6e25aada567fbc41167d69f4847303aa4 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:42 localhost python3[36697]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/registries.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:00:42 localhost python3[36742]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169641.7863815-100819-33363404076549/source dest=/etc/containers/registries.conf owner=root group=root setype=etc_t mode=0644 follow=False _original_basename=registries.conf.j2 checksum=710a00cfb11a4c3eba9c028ef1984a9fea9ba83a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:42 localhost python3[36772]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=containers option=pids_limit value=4096 backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:43 localhost python3[36788]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=events_logger value="journald" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:43 localhost python3[36804]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=runtime value="crun" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:43 localhost python3[36820]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=network option=network_backend value="netavark" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:44 localhost python3[36868]: ansible-ansible.legacy.stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:00:45 localhost python3[36911]: ansible-ansible.legacy.copy Invoked with dest=/etc/sysconfig/podman_drop_in src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169644.337327-101054-215972346515905/source _original_basename=tmpv6tmunxn follow=False checksum=0bfbc70e9a4740c9004b9947da681f723d529c83 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:45 localhost python3[36941]: ansible-file Invoked with path=/var/lib/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:45 localhost python3[36957]: ansible-file Invoked with mode=0750 path=/var/log/containers/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:46 localhost python3[36973]: ansible-file Invoked with path=/run/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:46 localhost python3[37021]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/run-redis.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:00:47 localhost python3[37064]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/run-redis.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169646.3526082-101233-9509126178311/source _original_basename=tmpns7q0p1y follow=False checksum=07018f7099c8edadf6a52c86069ae4e2a9407b28 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:47 localhost python3[37094]: ansible-file Invoked with mode=0750 path=/var/log/containers/rsyslog setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:47 localhost python3[37110]: ansible-file Invoked with path=/var/lib/rsyslog.container setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:48 localhost python3[37126]: ansible-ansible.legacy.dnf Invoked with name=['openssh-server'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 04:00:52 localhost python3[37175]: ansible-ansible.legacy.stat Invoked with path=/etc/ssh/sshd_config follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:00:53 localhost python3[37220]: ansible-ansible.legacy.copy Invoked with dest=/etc/ssh/sshd_config src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169652.3472555-101489-267420372257637/source validate=/usr/sbin/sshd -T -f %s mode=None follow=False _original_basename=sshd_config_block.j2 checksum=92fbff64c26224c12f8a576f9ce1a758767bd467 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:53 localhost python3[37251]: ansible-systemd Invoked with name=sshd state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 04:00:54 localhost systemd[1]: Stopping OpenSSH server daemon... Oct 11 04:00:54 localhost systemd[1]: sshd.service: Deactivated successfully. Oct 11 04:00:54 localhost systemd[1]: Stopped OpenSSH server daemon. Oct 11 04:00:54 localhost systemd[1]: sshd.service: Consumed 3.561s CPU time, read 0B from disk, written 120.0K to disk. Oct 11 04:00:54 localhost systemd[1]: Stopped target sshd-keygen.target. Oct 11 04:00:54 localhost systemd[1]: Stopping sshd-keygen.target... Oct 11 04:00:54 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 04:00:54 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 04:00:54 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 04:00:54 localhost systemd[1]: Reached target sshd-keygen.target. Oct 11 04:00:54 localhost systemd[1]: Starting OpenSSH server daemon... Oct 11 04:00:54 localhost sshd[37255]: main: sshd: ssh-rsa algorithm is disabled Oct 11 04:00:54 localhost systemd[1]: Started OpenSSH server daemon. Oct 11 04:00:55 localhost python3[37271]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:55 localhost python3[37287]: ansible-file Invoked with path=/var/log/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:55 localhost python3[37303]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:56 localhost python3[37319]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:56 localhost python3[37335]: ansible-file Invoked with path=/var/cache/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:56 localhost python3[37351]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:57 localhost python3[37367]: ansible-file Invoked with path=/srv/node/d1 state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:58 localhost python3[37383]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:01:00 localhost python3[37401]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:01:00 localhost python3[37419]: ansible-ansible.legacy.dnf Invoked with name=['chrony'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 04:01:04 localhost python3[37479]: ansible-ansible.legacy.stat Invoked with path=/etc/chrony.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:01:04 localhost python3[37524]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169664.1041617-102664-64866930290902/source dest=/etc/chrony.conf owner=root group=root mode=420 follow=False _original_basename=chrony.conf.j2 checksum=4fd4fbbb2de00c70a54478b7feb8ef8adf6a3362 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:01:05 localhost python3[37554]: ansible-ansible.legacy.systemd Invoked with enabled=True name=chronyd state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 04:01:06 localhost python3[37572]: ansible-ansible.legacy.systemd Invoked with name=chronyd state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 04:01:06 localhost chronyd[765]: chronyd exiting Oct 11 04:01:06 localhost systemd[1]: Stopping NTP client/server... Oct 11 04:01:06 localhost systemd[1]: chronyd.service: Deactivated successfully. Oct 11 04:01:06 localhost systemd[1]: Stopped NTP client/server. Oct 11 04:01:06 localhost systemd[1]: chronyd.service: Consumed 111ms CPU time, read 1.9M from disk, written 4.0K to disk. Oct 11 04:01:06 localhost systemd[1]: Starting NTP client/server... Oct 11 04:01:06 localhost chronyd[37579]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Oct 11 04:01:06 localhost chronyd[37579]: Frequency -30.447 +/- 0.086 ppm read from /var/lib/chrony/drift Oct 11 04:01:06 localhost chronyd[37579]: Loaded seccomp filter (level 2) Oct 11 04:01:06 localhost systemd[1]: Started NTP client/server. Oct 11 04:01:06 localhost python3[37628]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/chrony-online.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:01:07 localhost python3[37671]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169666.668534-102853-53677956158178/source dest=/etc/systemd/system/chrony-online.service _original_basename=chrony-online.service follow=False checksum=d4d85e046d61f558ac7ec8178c6d529d893e81e1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:01:07 localhost python3[37701]: ansible-systemd Invoked with state=started name=chrony-online.service enabled=True daemon-reload=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 04:01:07 localhost systemd[1]: Reloading. Oct 11 04:01:07 localhost systemd-rc-local-generator[37724]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 04:01:07 localhost systemd-sysv-generator[37730]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 04:01:07 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 04:01:08 localhost systemd[1]: Reloading. Oct 11 04:01:08 localhost systemd-rc-local-generator[37763]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 04:01:08 localhost systemd-sysv-generator[37767]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 04:01:08 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 04:01:08 localhost systemd[1]: Starting chronyd online sources service... Oct 11 04:01:08 localhost chronyc[37775]: 200 OK Oct 11 04:01:08 localhost systemd[1]: chrony-online.service: Deactivated successfully. Oct 11 04:01:08 localhost systemd[1]: Finished chronyd online sources service. Oct 11 04:01:08 localhost python3[37791]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:01:08 localhost chronyd[37579]: System clock was stepped by -0.000000 seconds Oct 11 04:01:09 localhost python3[37808]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:01:10 localhost chronyd[37579]: Selected source 23.133.168.245 (pool.ntp.org) Oct 11 04:01:19 localhost python3[37825]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:01:19 localhost chronyd[37579]: System clock was stepped by 0.000009 seconds Oct 11 04:01:19 localhost python3[37842]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:01:20 localhost python3[37859]: ansible-timezone Invoked with name=UTC hwclock=None Oct 11 04:01:20 localhost systemd[1]: Starting Time & Date Service... Oct 11 04:01:20 localhost systemd[1]: Started Time & Date Service. Oct 11 04:01:21 localhost python3[37879]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:01:21 localhost python3[37896]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:01:22 localhost python3[37913]: ansible-slurp Invoked with src=/etc/tuned/active_profile Oct 11 04:01:22 localhost python3[37929]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 04:01:25 localhost python3[37945]: ansible-file Invoked with path=/var/log/containers state=directory setype=container_file_t selevel=s0 mode=488 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Oct 11 04:01:26 localhost python3[37961]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None setype=None attributes=None Oct 11 04:01:26 localhost python3[37977]: ansible-file Invoked with path=/var/lib/tripleo-config state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Oct 11 04:01:27 localhost python3[37993]: ansible-file Invoked with path=/var/lib/container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:01:27 localhost python3[38009]: ansible-file Invoked with path=/var/lib/docker-container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:01:27 localhost python3[38025]: ansible-community.general.sefcontext Invoked with target=/var/lib/container-config-scripts(/.*)? setype=container_file_t state=present ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Oct 11 04:01:28 localhost kernel: SELinux: Converting 2723 SID table entries... Oct 11 04:01:28 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 04:01:28 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 04:01:28 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 04:01:28 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 04:01:28 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 04:01:28 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 04:01:28 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 04:01:28 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=15 res=1 Oct 11 04:01:29 localhost python3[38048]: ansible-file Invoked with path=/var/lib/container-config-scripts state=directory setype=container_file_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:01:31 localhost python3[38185]: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-config/container-startup-config config_data={'step_0':********@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'os0Agkj03LOntIGpXqXNEwPpL', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, 'mysql_data_ownership': {'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, 'rabbitmq_bootstrap': {'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1760169090'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, 'redis_tls_proxy': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}}, 'step_2': {'cinder_api_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, 'cinder_scheduler_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, 'clustercheck': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, 'glance_init_logs': {'command': ['/bin/bash', '-c', 'chown -R glance:glance /var/log/glance'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z']}, 'heat_init_log': {'command': ['/bin/bash', '-c', 'chown -R heat:heat /var/log/heat'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/heat:/var/log/heat:z']}, 'horizon_fix_perms': {'command': ['/bin/bash', '-c', 'touch /var/log/horizon/horizon.log ; chown -R apache:apache /var/log/horizon && chmod -R a+rx /etc/openstack-dashboard'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/lib/config-data/puppet-generated/horizon/etc/openstack-dashboard:/etc/openstack-dashboard']}, 'keystone_init_log': {'command': ['/bin/bash', '-c', 'chown -R keystone:keystone /var/log/keystone'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z']}, 'manila_init_logs': {'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, 'mysql_wait_bundle': {'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,galera_ready,mysql_database,mysql_grant,mysql_user', 'include tripleo::profile::pacemaker::database::mysql_bundle'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1760169090'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/ Oct 11 04:01:31 localhost rsyslogd[758]: message too long (84240) with configured size 8096, begin of message is: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-c [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Oct 11 04:01:31 localhost python3[38201]: ansible-file Invoked with path=/var/lib/kolla/config_files state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Oct 11 04:01:32 localhost python3[38217]: ansible-file Invoked with path=/var/lib/config-data mode=493 state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Oct 11 04:01:32 localhost python3[38233]: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/config_files/ceilometer_agent_central.json': {'command': '/usr/bin/ceilometer-polling --polling-namespaces central --logfile /var/log/ceilometer/central.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_gnocchi_upgrade.json': {'command': "/usr/bin/bootstrap_host_exec ceilometer_agent_central su ceilometer -s /bin/bash -c 'for n in {1..10}; do /usr/bin/ceilometer-upgrade && exit 0 || sleep 30; done; exit 1'", 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_notification.json': {'command': '/usr/bin/ceilometer-agent-notification --logfile /var/log/ceilometer/agent-notification.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/cinder_api.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}]}, '/var/lib/kolla/config_files/cinder_api_db_sync.json': {'command': "/usr/bin/bootstrap_host_exec cinder_api su cinder -s /bin/bash -c 'cinder-manage db sync --bump-versions'", 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_backup.json': {'command': '/usr/bin/cinder-backup --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_scheduler.json': {'command': '/usr/bin/cinder-scheduler --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_volume.json': {'command': '/usr/bin/cinder-volume --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/clustercheck.json': {'command': 'bash -c $* -- eval source /etc/sysconfig/clustercheck; exec socat -T"${TRIPLEO_HEALTHCHECK_TIMEOUT:-2}" "$TRIPLEO_SOCAT_BIND" system:"grep -qPe \\"^\\\\r\\$\\" && /usr/bin/clustercheck"', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/collectd.json': {'command': '/usr/sbin/collectd -f', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/collectd.d'}], 'permissions': [{'owner': 'collectd:collectd', 'path': '/var/log/collectd', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/scripts', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/config-scripts', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api.json': {'command': '/usr/bin/glance-api --config-file /usr/share/glance/glance-api-dist.conf --config-file /etc/glance/glance-api.conf --config-file /etc/glance/glance-image-import.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/lib/glance', 'recurse': True}, {'owner': 'glance:glance', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}]}, '/var/lib/kolla/config_files/glance_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/log/glance', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api_tls_proxy.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modul Oct 11 04:01:32 localhost rsyslogd[758]: message too long (37323) with configured size 8096, begin of message is: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/conf [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Oct 11 04:01:42 localhost python3[38249]: ansible-stat Invoked with path=/etc/ipa/default.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 04:01:44 localhost python3[38265]: ansible-ipaclient_test Invoked with domain=ooo.test servers=['ipa.ooo.test'] hostname=np0005481012.ooo.test no_ntp=False force_ntpd=False no_nisdomain=False kinit_attempts=5 configure_firefox=False all_ip_addresses=False on_master=False enable_dns_updates=False realm=None ntp_servers=None ntp_pool=None nisdomain=None ca_cert_files=None firefox_dir=None ip_addresses=None Oct 11 04:01:45 localhost python3[38287]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:01:46 localhost python3[38303]: ansible-ipaclient_setup_ntp Invoked with ntp_servers=[''] ntp_pool= no_ntp=False on_master=False servers=['ipa.ooo.test'] domain=ooo.test Oct 11 04:01:46 localhost systemd[1]: Reloading. Oct 11 04:01:46 localhost systemd-rc-local-generator[38333]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 04:01:46 localhost systemd-sysv-generator[38338]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 04:01:46 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 04:01:46 localhost systemd[1]: Stopping NTP client/server... Oct 11 04:01:46 localhost chronyd[37579]: chronyd exiting Oct 11 04:01:46 localhost systemd[1]: chronyd.service: Deactivated successfully. Oct 11 04:01:46 localhost systemd[1]: Stopped NTP client/server. Oct 11 04:01:46 localhost systemd[1]: Starting NTP client/server... Oct 11 04:01:46 localhost chronyd[38354]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Oct 11 04:01:46 localhost chronyd[38354]: Frequency -30.447 +/- 0.088 ppm read from /var/lib/chrony/drift Oct 11 04:01:46 localhost chronyd[38354]: Loaded seccomp filter (level 2) Oct 11 04:01:46 localhost systemd[1]: Started NTP client/server. Oct 11 04:01:50 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Oct 11 04:01:50 localhost chronyd[38354]: Selected source 23.133.168.245 (pool.ntp.org) Oct 11 04:01:51 localhost sshd[38360]: main: sshd: ssh-rsa algorithm is disabled Oct 11 04:01:53 localhost python3[38378]: ansible-ipaclient_test_keytab Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005481012.ooo.test kdc=ipa.ooo.test kinit_attempts=5 Oct 11 04:01:54 localhost python3[38399]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/ipa-rmkeytab -k /etc/krb5.keytab -r "OOO.TEST"#012 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:01:55 localhost python3[38416]: ansible-ipaclient_set_hostname Invoked with hostname=np0005481012.ooo.test Oct 11 04:01:55 localhost systemd[1]: Starting Hostname Service... Oct 11 04:01:55 localhost systemd[1]: Started Hostname Service. Oct 11 04:01:55 localhost systemd-hostnamed[38420]: Hostname set to (static) Oct 11 04:01:56 localhost python3[38436]: ansible-ipaclient_temp_krb5 Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005481012.ooo.test kdc=ipa.ooo.test on_master=False Oct 11 04:01:57 localhost python3[38457]: ansible-ipaclient_join Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005481012.ooo.test force_join=False password=NOT_LOGGING_PARAMETER kinit_attempts=5 krb_name=/tmp/tmp564g5w7b principal=None keytab=None admin_keytab=None ca_cert_file=None debug=None Oct 11 04:01:57 localhost python3[38457]: ansible-ipaclient_join Enrolled in IPA realm OOO.TEST Oct 11 04:01:58 localhost python3[38479]: ansible-ipaclient_ipa_conf Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005481012.ooo.test basedn=dc=ooo,dc=test Oct 11 04:01:59 localhost python3[38497]: ansible-ipaclient_setup_sssd Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005481012.ooo.test on_master=False no_ssh=False no_sshd=False no_sudo=False all_ip_addresses=False fixed_primary=False permit=False enable_dns_updates=False preserve_sssd=False no_krb5_offline_passwords=False Oct 11 04:01:59 localhost systemd-journald[617]: Field hash table of /run/log/journal/0d75598033f175d0e781a840bff83569/system.journal has a fill level at 76.0 (253 of 333 items), suggesting rotation. Oct 11 04:01:59 localhost systemd-journald[617]: /run/log/journal/0d75598033f175d0e781a840bff83569/system.journal: Journal header limits reached or header out-of-date, rotating. Oct 11 04:01:59 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 04:01:59 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 04:02:00 localhost python3[38515]: ansible-ipaclient_api Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST hostname=np0005481012.ooo.test krb_name=/tmp/tmp564g5w7b debug=False Oct 11 04:02:02 localhost sshd[38529]: main: sshd: ssh-rsa algorithm is disabled Oct 11 04:02:02 localhost python3[38546]: ansible-ipaclient_setup_nss Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005481012.ooo.test subject_base=O=OOO.TEST principal=admin mkhomedir=False ca_enabled=True on_master=False dnsok=False enable_dns_updates=False all_ip_addresses=False request_cert=False preserve_sssd=False no_ssh=False no_sshd=False no_sudo=False fixed_primary=False permit=False no_krb5_offline_passwords=False no_dns_sshfp=False nosssd_files={} krb_name=/tmp/tmp564g5w7b ip_addresses=None Oct 11 04:02:06 localhost systemd[1]: Starting System Security Services Daemon... Oct 11 04:02:06 localhost sssd[38583]: Starting up Oct 11 04:02:06 localhost sssd_be[38584]: Starting up Oct 11 04:02:06 localhost sssd_nss[38585]: Starting up Oct 11 04:02:06 localhost sssd_ssh[38587]: Starting up Oct 11 04:02:06 localhost sssd_sudo[38588]: Starting up Oct 11 04:02:06 localhost sssd_pam[38586]: Starting up Oct 11 04:02:06 localhost sssd_pac[38589]: Starting up Oct 11 04:02:06 localhost systemd[1]: Started System Security Services Daemon. Oct 11 04:02:06 localhost systemd[1]: Reloading. Oct 11 04:02:06 localhost systemd-sysv-generator[38615]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 04:02:06 localhost systemd-rc-local-generator[38611]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 04:02:06 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 04:02:07 localhost python3[38644]: ansible-ipaclient_setup_ssh Invoked with servers=['ipa.ooo.test'] sssd=True no_ssh=False ssh_trust_dns=False no_sshd=False Oct 11 04:02:08 localhost systemd[1]: Stopping OpenSSH server daemon... Oct 11 04:02:08 localhost systemd[1]: sshd.service: Deactivated successfully. Oct 11 04:02:08 localhost systemd[1]: sshd.service: Unit process 38529 (sshd) remains running after unit stopped. Oct 11 04:02:08 localhost systemd[1]: sshd.service: Unit process 38530 (sshd) remains running after unit stopped. Oct 11 04:02:08 localhost systemd[1]: Stopped OpenSSH server daemon. Oct 11 04:02:08 localhost systemd[1]: Stopped target sshd-keygen.target. Oct 11 04:02:08 localhost systemd[1]: Stopping sshd-keygen.target... Oct 11 04:02:08 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 04:02:08 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 04:02:08 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 04:02:08 localhost systemd[1]: Reached target sshd-keygen.target. Oct 11 04:02:08 localhost systemd[1]: Starting OpenSSH server daemon... Oct 11 04:02:08 localhost sshd[38649]: main: sshd: ssh-rsa algorithm is disabled Oct 11 04:02:08 localhost systemd[1]: Started OpenSSH server daemon. Oct 11 04:02:08 localhost python3[38666]: ansible-ipaclient_setup_automount Invoked with servers=['ipa.ooo.test'] sssd=True automount_location=None Oct 11 04:02:09 localhost python3[38683]: ansible-ipaclient_setup_nis Invoked with domain=ooo.test nisdomain=None Oct 11 04:02:09 localhost systemd[1]: Reloading. Oct 11 04:02:09 localhost systemd-rc-local-generator[38714]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 04:02:09 localhost systemd-sysv-generator[38718]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 04:02:09 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 04:02:09 localhost systemd[1]: nis-domainname.service: Deactivated successfully. Oct 11 04:02:09 localhost systemd[1]: Stopped Read and set NIS domainname from /etc/sysconfig/network. Oct 11 04:02:09 localhost systemd[1]: Stopping Read and set NIS domainname from /etc/sysconfig/network... Oct 11 04:02:09 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Oct 11 04:02:09 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Oct 11 04:02:10 localhost python3[38744]: ansible-ansible.builtin.file Invoked with path=/tmp/tmp564g5w7b state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:02:11 localhost python3[38760]: ansible-ipaclient_setup_krb5 Invoked with realm=OOO.TEST domain=ooo.test servers=['ipa.ooo.test'] kdc=ipa.ooo.test dnsok=False client_domain=ooo.test hostname=np0005481012.ooo.test sssd=True force=True Oct 11 04:02:12 localhost python3[38781]: ansible-ipaclient_setup_certmonger Invoked with realm=OOO.TEST hostname=np0005481012.ooo.test subject_base=O=OOO.TEST ca_enabled=True request_cert=False Oct 11 04:02:12 localhost python3[38800]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:02:13 localhost sshd[38817]: main: sshd: ssh-rsa algorithm is disabled Oct 11 04:02:13 localhost python3[38816]: ansible-ansible.builtin.file Invoked with path=/tmp/tmp564g5w7b state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:02:13 localhost python3[38834]: ansible-ansible.builtin.file Invoked with path=/tmp/tmp564g5w7b.ipabkp state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:02:14 localhost python3[38850]: ansible-systemd Invoked with daemon_reload=True name=certmonger.service state=restarted daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 04:02:14 localhost systemd[1]: Reloading. Oct 11 04:02:14 localhost systemd-rc-local-generator[38876]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 04:02:14 localhost systemd-sysv-generator[38880]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 04:02:14 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 04:02:15 localhost systemd[1]: Starting Certificate monitoring and PKI enrollment... Oct 11 04:02:15 localhost certmonger[38891]: 2025-10-11 08:02:15 [38891] Changing to root directory. Oct 11 04:02:15 localhost certmonger[38891]: 2025-10-11 08:02:15 [38891] Obtaining system lock. Oct 11 04:02:15 localhost systemd[1]: Started Certificate monitoring and PKI enrollment. Oct 11 04:02:15 localhost certmonger[38892]: 2025-10-11 08:02:15 [38892] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:15 localhost certmonger[38893]: 2025-10-11 08:02:15 [38893] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:15 localhost certmonger[38894]: 2025-10-11 08:02:15 [38894] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:15 localhost certmonger[38895]: 2025-10-11 08:02:15 [38895] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:15 localhost certmonger[38896]: 2025-10-11 08:02:15 [38896] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:15 localhost certmonger[38897]: 2025-10-11 08:02:15 [38897] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:15 localhost certmonger[38898]: 2025-10-11 08:02:15 [38898] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:15 localhost certmonger[38899]: 2025-10-11 08:02:15 [38899] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:15 localhost certmonger[38900]: 2025-10-11 08:02:15 [38900] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Oct 11 04:02:15 localhost certmonger[38901]: 2025-10-11 08:02:15 [38901] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Oct 11 04:02:15 localhost certmonger[38902]: 2025-10-11 08:02:15 [38902] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Oct 11 04:02:15 localhost certmonger[38903]: 2025-10-11 08:02:15 [38903] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Oct 11 04:02:15 localhost certmonger[38904]: 2025-10-11 08:02:15 [38904] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Oct 11 04:02:15 localhost certmonger[38905]: 2025-10-11 08:02:15 [38905] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Oct 11 04:02:15 localhost certmonger[38906]: 2025-10-11 08:02:15 [38906] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Oct 11 04:02:15 localhost certmonger[38907]: 2025-10-11 08:02:15 [38907] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Oct 11 04:02:15 localhost certmonger[38908]: 2025-10-11 08:02:15 [38908] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Oct 11 04:02:15 localhost certmonger[38909]: 2025-10-11 08:02:15 [38909] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Oct 11 04:02:15 localhost certmonger[38910]: 2025-10-11 08:02:15 [38910] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Oct 11 04:02:15 localhost certmonger[38911]: 2025-10-11 08:02:15 [38911] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Oct 11 04:02:15 localhost certmonger[38912]: 2025-10-11 08:02:15 [38912] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Oct 11 04:02:15 localhost certmonger[38913]: 2025-10-11 08:02:15 [38913] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Oct 11 04:02:15 localhost certmonger[38914]: 2025-10-11 08:02:15 [38914] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Oct 11 04:02:15 localhost certmonger[38915]: 2025-10-11 08:02:15 [38915] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Oct 11 04:02:15 localhost certmonger[38891]: 2025-10-11 08:02:15 [38891] No hooks set for ca-pre-save command. Oct 11 04:02:15 localhost certmonger[38891]: 2025-10-11 08:02:15 [38891] No hooks set for ca-post-save command. Oct 11 04:02:15 localhost certmonger[38918]: 2025-10-11 08:02:15 [38918] Certificate "OOO.TEST IPA CA" valid for 631150987s. Oct 11 04:02:15 localhost certmonger[38891]: 2025-10-11 08:02:15 [38891] No hooks set for ca-pre-save command. Oct 11 04:02:15 localhost certmonger[38891]: 2025-10-11 08:02:15 [38891] No hooks set for ca-post-save command. Oct 11 04:02:15 localhost certmonger[38921]: 2025-10-11 08:02:15 [38921] Certificate "Local Signing Authority" valid for 31535999s. Oct 11 04:02:25 localhost python3[38971]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/config_step.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:02:25 localhost python3[39014]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/config_step.json force=True mode=0600 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169744.6757066-106131-271926552645555/source _original_basename=tmpij9svm7t follow=False checksum=dfdcc7695edd230e7a2c06fc7b739bfa56506d8f backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:02:25 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 11 04:02:25 localhost python3[39046]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_1 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 04:02:28 localhost python3[39169]: ansible-file Invoked with path=/var/lib/container-puppet state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Oct 11 04:02:30 localhost python3[39290]: ansible-container_puppet_config Invoked with update_config_hash_only=True no_archive=True check_mode=False config_vol_prefix=/var/lib/config-data debug=False net_host=True puppet_config= short_hostname= step=6 Oct 11 04:02:31 localhost python3[39306]: ansible-file Invoked with path=/etc/pki/tls/certs/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Oct 11 04:02:32 localhost python3[39322]: ansible-file Invoked with path=/etc/pki/tls/private/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Oct 11 04:02:33 localhost python3[39338]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 04:02:34 localhost python3[39358]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 04:02:37 localhost python3[39375]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 04:02:40 localhost python3[39392]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:02:40 localhost python3[39408]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:02:41 localhost python3[39424]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 04:02:41 localhost systemd[1]: Reloading. Oct 11 04:02:41 localhost systemd-rc-local-generator[39448]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 04:02:41 localhost systemd-sysv-generator[39454]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 04:02:41 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 04:02:42 localhost python3[39477]: ansible-certificate_request Invoked with name=httpd-ctlplane dns=['np0005481012.ctlplane.ooo.test'] principal=['HTTP/np0005481012.ctlplane.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-ctlplane.crt /etc/pki/tls/certs/httpd/httpd-ctlplane.crt#012cp /etc/pki/tls/private/httpd-ctlplane.key /etc/pki/tls/private/httpd/httpd-ctlplane.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 04:02:43 localhost certmonger[38891]: 2025-10-11 08:02:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:43 localhost certmonger[38891]: 2025-10-11 08:02:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:43 localhost certmonger[38891]: 2025-10-11 08:02:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:43 localhost certmonger[38891]: 2025-10-11 08:02:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:43 localhost certmonger[38891]: 2025-10-11 08:02:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:43 localhost certmonger[38891]: 2025-10-11 08:02:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:43 localhost certmonger[38891]: 2025-10-11 08:02:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:43 localhost certmonger[38891]: 2025-10-11 08:02:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:43 localhost certmonger[38891]: 2025-10-11 08:02:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[39487]: 2025-10-11 08:02:44 [39487] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481012.ctlplane.ooo.test" for child. Oct 11 04:02:44 localhost certmonger[39487]: 2025-10-11 08:02:44 [39487] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481012.ctlplane.ooo.test Oct 11 04:02:44 localhost certmonger[39487]: " for child. Oct 11 04:02:44 localhost certmonger[39487]: 2025-10-11 08:02:44 [39487] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005481012.ctlplane.ooo.test@OOO.TEST Oct 11 04:02:44 localhost certmonger[39487]: " for child. Oct 11 04:02:44 localhost certmonger[39487]: 2025-10-11 08:02:44 [39487] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 04:02:44 localhost certmonger[39487]: 2025-10-11 08:02:44 [39487] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 04:02:44 localhost certmonger[39487]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NDgxMDEyLmN0bHBsYW5lLm9v Oct 11 04:02:44 localhost certmonger[39487]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAn7CEfTYQ7iM1 Oct 11 04:02:44 localhost certmonger[39487]: WzL4I7asiFgYMu0L/25zde5Idq7D30MQQ6+ti7c8wV/BApBLravM7TXjuVxPrHbr Oct 11 04:02:44 localhost certmonger[39487]: HEuJLzVy6QgxxSnwF4Gsk/N3YTGWq8j2oYc7mrs3gJomOrDYBIpFxBwqeImjoNHj Oct 11 04:02:44 localhost certmonger[39487]: n04Ug1uM2rFXWoyYnyiT/khDkUnRQnV24l1TgKMYcRU2PTKHtg0T/Hbz6Mvz9QHe Oct 11 04:02:44 localhost certmonger[39487]: sS9zs98At71n83aJDi2FI3pxZOdZowu7EQCKe/oCMvIiIk6l1RLXg0zcjGxZucJt Oct 11 04:02:44 localhost certmonger[39487]: GJdMWj84tcBnWtsxfQwGdBanbn03FfrriatQKyLvDSS2wIzCNclGN5IdJkK0oIcO Oct 11 04:02:44 localhost certmonger[39487]: DcE3N2oL+QIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAwADEA Oct 11 04:02:44 localhost certmonger[39487]: MQAwADgAMAAyADQAMzCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Oct 11 04:02:44 localhost certmonger[39487]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU0ODEwMTIuY3RscGxhbmUub29vLnRlc3Sg Oct 11 04:02:44 localhost certmonger[39487]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTQ4MTAxMi5jdGxwbGFuZS5vb28u Oct 11 04:02:44 localhost certmonger[39487]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Oct 11 04:02:44 localhost certmonger[39487]: oSgwJhsESFRUUBsebnAwMDA1NDgxMDEyLmN0bHBsYW5lLm9vby50ZXN0MB0GA1Ud Oct 11 04:02:44 localhost certmonger[39487]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Oct 11 04:02:44 localhost certmonger[39487]: BBTDNYSx4aKHchI04szT4TSv2eZPsjANBgkqhkiG9w0BAQsFAAOCAQEAP2jqmFQC Oct 11 04:02:44 localhost certmonger[39487]: xbsI3PF5h8h5Fooryh29qJdl2Gs2lQ9vCEzacK/9K7CL+ybtLBm5wl4OWI9K372l Oct 11 04:02:44 localhost certmonger[39487]: 7LzJNDimcvp3wQLEElPP82nh3mSb2zq75C5jFUS6eQkW3J2OPC50IqthnCH4/IQI Oct 11 04:02:44 localhost certmonger[39487]: E6BabupoOO9BesjhoePiRZf7dbzDxW4r3CuIpsCW/3h8UQSQljJahba9U2LbC27H Oct 11 04:02:44 localhost certmonger[39487]: vIvnPpCkTm3wIOcDCWmHTi7Nc+IR7wIndO4PptwIJiM/plfEZcbgPrK0tFiyaSL6 Oct 11 04:02:44 localhost certmonger[39487]: Nu7IC7PVIACb71SfkpdkZKlsHItdYgttC5asftSnn4nbkuwGvQQzLegq7DH1xPHp Oct 11 04:02:44 localhost certmonger[39487]: +OpYke3RzTGFmA== Oct 11 04:02:44 localhost certmonger[39487]: -----END CERTIFICATE REQUEST----- Oct 11 04:02:44 localhost certmonger[39487]: " for child. Oct 11 04:02:44 localhost certmonger[39487]: 2025-10-11 08:02:44 [39487] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 04:02:44 localhost certmonger[39487]: 2025-10-11 08:02:44 [39487] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAn7CEfTYQ7iM1WzL4I7asiFgYMu0L/25zde5Idq7D30MQQ6+ti7c8wV/BApBLravM7TXjuVxPrHbrHEuJLzVy6QgxxSnwF4Gsk/N3YTGWq8j2oYc7mrs3gJomOrDYBIpFxBwqeImjoNHjn04Ug1uM2rFXWoyYnyiT/khDkUnRQnV24l1TgKMYcRU2PTKHtg0T/Hbz6Mvz9QHesS9zs98At71n83aJDi2FI3pxZOdZowu7EQCKe/oCMvIiIk6l1RLXg0zcjGxZucJtGJdMWj84tcBnWtsxfQwGdBanbn03FfrriatQKyLvDSS2wIzCNclGN5IdJkK0oIcODcE3N2oL+QIDAQAB" for child. Oct 11 04:02:44 localhost certmonger[39487]: 2025-10-11 08:02:44 [39487] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 04:02:44 localhost certmonger[39487]: 2025-10-11 08:02:44 [39487] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 04:02:44 localhost certmonger[39487]: 2025-10-11 08:02:44 [39487] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 04:02:44 localhost certmonger[39487]: 2025-10-11 08:02:44 [39487] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:44 localhost certmonger[39487]: 2025-10-11 08:02:44 [39487] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[39487]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 04:02:44 localhost certmonger[39487]: Certificate: "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" Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Certificate submission still ongoing. Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Certificate submission attempt complete. Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Child status = 0. Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Child output: Oct 11 04:02:44 localhost certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 04:02:44 localhost certmonger[38891]: MIIFSTCCA7GgAwIBAgIBEDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:44 localhost certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:44 localhost certmonger[38891]: MDI0NFoXDTI3MTAxMjA4MDI0NFowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Oct 11 04:02:44 localhost certmonger[38891]: BAMMHm5wMDAwNTQ4MTAxMi5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Oct 11 04:02:44 localhost certmonger[38891]: AQEBBQADggEPADCCAQoCggEBAJ+whH02EO4jNVsy+CO2rIhYGDLtC/9uc3XuSHau Oct 11 04:02:44 localhost certmonger[38891]: w99DEEOvrYu3PMFfwQKQS62rzO0147lcT6x26xxLiS81cukIMcUp8BeBrJPzd2Ex Oct 11 04:02:44 localhost certmonger[38891]: lqvI9qGHO5q7N4CaJjqw2ASKRcQcKniJo6DR459OFINbjNqxV1qMmJ8ok/5IQ5FJ Oct 11 04:02:44 localhost certmonger[38891]: 0UJ1duJdU4CjGHEVNj0yh7YNE/x28+jL8/UB3rEvc7PfALe9Z/N2iQ4thSN6cWTn Oct 11 04:02:44 localhost certmonger[38891]: WaMLuxEAinv6AjLyIiJOpdUS14NM3IxsWbnCbRiXTFo/OLXAZ1rbMX0MBnQWp259 Oct 11 04:02:44 localhost certmonger[38891]: NxX664mrUCsi7w0ktsCMwjXJRjeSHSZCtKCHDg3BNzdqC/kCAwEAAaOCAd0wggHZ Oct 11 04:02:44 localhost certmonger[38891]: MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4w Oct 11 04:02:44 localhost certmonger[38891]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Oct 11 04:02:44 localhost certmonger[38891]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Oct 11 04:02:44 localhost certmonger[38891]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Oct 11 04:02:44 localhost certmonger[38891]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Oct 11 04:02:44 localhost certmonger[38891]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFKZ5EOUkbgCa4MuuerRCvDuGRn53 Oct 11 04:02:44 localhost certmonger[38891]: MIG2BgNVHREEga4wgauCHm5wMDAwNTQ4MTAxMi5jdGxwbGFuZS5vb28udGVzdKA8 Oct 11 04:02:44 localhost certmonger[38891]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NDgxMDEyLmN0bHBsYW5lLm9vby50 Oct 11 04:02:44 localhost certmonger[38891]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Oct 11 04:02:44 localhost certmonger[38891]: KDAmGwRIVFRQGx5ucDAwMDU0ODEwMTIuY3RscGxhbmUub29vLnRlc3QwDQYJKoZI Oct 11 04:02:44 localhost certmonger[38891]: hvcNAQELBQADggGBACa906aw3DOP0m7i8YlWwjupjHnzLhMJrk4CsM+4kFWB7RM0 Oct 11 04:02:44 localhost certmonger[38891]: mXxbvF0/Ut5hzOVw8HEyWQevvR/3ocCJv5FxrgCQ5DDOnYYJ8CYrH2QDoiXBFm2/ Oct 11 04:02:44 localhost certmonger[38891]: qwgOB0OJHdO8KP8V6jTep701qD7nDF6jmUcquyxUtbIBIP4O0hX9ELhzgwPD8WhW Oct 11 04:02:44 localhost certmonger[38891]: EyBqtO8FL+/THhjcLyoYZwYSoMN6ft196CKJ7vrcMp3P1JHZ0B2AuvDG2b45T/w8 Oct 11 04:02:44 localhost certmonger[38891]: 8MQmhOlkqibcbusmFa0UgYgNK5rK++AivwqL7YFUXMNBm4mhmNLB4M3j0g/Zp0Dc Oct 11 04:02:44 localhost certmonger[38891]: FCA29ZssfpTx9ZuUobZSRtDxTgTEq1QLomATj54t8dy5Y/kTS2lyZ6H1xv+zGID/ Oct 11 04:02:44 localhost certmonger[38891]: ZBSr+gaFJPjee/BhREMp9Z6aVbaW6hbPCNNy3Nodu2CpmyYoPBhMMOlOOKRIH928 Oct 11 04:02:44 localhost certmonger[38891]: ZQoL9Ubxi3yx1PpahVjyN+KXm2iOEwclfTXssMR81GoDjAY4MiQkCu6iHouhCCU2 Oct 11 04:02:44 localhost certmonger[38891]: s0MFy0drS0HcS0Z5vQ== Oct 11 04:02:44 localhost certmonger[38891]: -----END CERTIFICATE----- Oct 11 04:02:44 localhost certmonger[38891]: " Oct 11 04:02:44 localhost certmonger[39489]: 2025-10-11 08:02:44 [39489] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 04:02:44 localhost certmonger[39489]: MIIFSTCCA7GgAwIBAgIBEDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:44 localhost certmonger[39489]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:44 localhost certmonger[39489]: MDI0NFoXDTI3MTAxMjA4MDI0NFowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Oct 11 04:02:44 localhost certmonger[39489]: BAMMHm5wMDAwNTQ4MTAxMi5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Oct 11 04:02:44 localhost certmonger[39489]: AQEBBQADggEPADCCAQoCggEBAJ+whH02EO4jNVsy+CO2rIhYGDLtC/9uc3XuSHau Oct 11 04:02:44 localhost certmonger[39489]: w99DEEOvrYu3PMFfwQKQS62rzO0147lcT6x26xxLiS81cukIMcUp8BeBrJPzd2Ex Oct 11 04:02:44 localhost certmonger[39489]: lqvI9qGHO5q7N4CaJjqw2ASKRcQcKniJo6DR459OFINbjNqxV1qMmJ8ok/5IQ5FJ Oct 11 04:02:44 localhost certmonger[39489]: 0UJ1duJdU4CjGHEVNj0yh7YNE/x28+jL8/UB3rEvc7PfALe9Z/N2iQ4thSN6cWTn Oct 11 04:02:44 localhost certmonger[39489]: WaMLuxEAinv6AjLyIiJOpdUS14NM3IxsWbnCbRiXTFo/OLXAZ1rbMX0MBnQWp259 Oct 11 04:02:44 localhost certmonger[39489]: NxX664mrUCsi7w0ktsCMwjXJRjeSHSZCtKCHDg3BNzdqC/kCAwEAAaOCAd0wggHZ Oct 11 04:02:44 localhost certmonger[39489]: MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4w Oct 11 04:02:44 localhost certmonger[39489]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Oct 11 04:02:44 localhost certmonger[39489]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Oct 11 04:02:44 localhost certmonger[39489]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Oct 11 04:02:44 localhost certmonger[39489]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Oct 11 04:02:44 localhost certmonger[39489]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFKZ5EOUkbgCa4MuuerRCvDuGRn53 Oct 11 04:02:44 localhost certmonger[39489]: MIG2BgNVHREEga4wgauCHm5wMDAwNTQ4MTAxMi5jdGxwbGFuZS5vb28udGVzdKA8 Oct 11 04:02:44 localhost certmonger[39489]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NDgxMDEyLmN0bHBsYW5lLm9vby50 Oct 11 04:02:44 localhost certmonger[39489]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Oct 11 04:02:44 localhost certmonger[39489]: KDAmGwRIVFRQGx5ucDAwMDU0ODEwMTIuY3RscGxhbmUub29vLnRlc3QwDQYJKoZI Oct 11 04:02:44 localhost certmonger[39489]: hvcNAQELBQADggGBACa906aw3DOP0m7i8YlWwjupjHnzLhMJrk4CsM+4kFWB7RM0 Oct 11 04:02:44 localhost certmonger[39489]: mXxbvF0/Ut5hzOVw8HEyWQevvR/3ocCJv5FxrgCQ5DDOnYYJ8CYrH2QDoiXBFm2/ Oct 11 04:02:44 localhost certmonger[39489]: qwgOB0OJHdO8KP8V6jTep701qD7nDF6jmUcquyxUtbIBIP4O0hX9ELhzgwPD8WhW Oct 11 04:02:44 localhost certmonger[39489]: EyBqtO8FL+/THhjcLyoYZwYSoMN6ft196CKJ7vrcMp3P1JHZ0B2AuvDG2b45T/w8 Oct 11 04:02:44 localhost certmonger[39489]: 8MQmhOlkqibcbusmFa0UgYgNK5rK++AivwqL7YFUXMNBm4mhmNLB4M3j0g/Zp0Dc Oct 11 04:02:44 localhost certmonger[39489]: FCA29ZssfpTx9ZuUobZSRtDxTgTEq1QLomATj54t8dy5Y/kTS2lyZ6H1xv+zGID/ Oct 11 04:02:44 localhost certmonger[39489]: ZBSr+gaFJPjee/BhREMp9Z6aVbaW6hbPCNNy3Nodu2CpmyYoPBhMMOlOOKRIH928 Oct 11 04:02:44 localhost certmonger[39489]: ZQoL9Ubxi3yx1PpahVjyN+KXm2iOEwclfTXssMR81GoDjAY4MiQkCu6iHouhCCU2 Oct 11 04:02:44 localhost certmonger[39489]: s0MFy0drS0HcS0Z5vQ== Oct 11 04:02:44 localhost certmonger[39489]: -----END CERTIFICATE----- Oct 11 04:02:44 localhost certmonger[39489]: ". Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Certificate submission still ongoing. Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Certificate submission postprocessing complete. Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Child status = 0. Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Child output: Oct 11 04:02:44 localhost certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----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\ns0MFy0drS0HcS0Z5vQ==\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 04:02:44 localhost certmonger[38891]: " Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 04:02:44 localhost certmonger[38891]: MIIFSTCCA7GgAwIBAgIBEDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:44 localhost certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:44 localhost certmonger[38891]: MDI0NFoXDTI3MTAxMjA4MDI0NFowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Oct 11 04:02:44 localhost certmonger[38891]: BAMMHm5wMDAwNTQ4MTAxMi5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Oct 11 04:02:44 localhost certmonger[38891]: AQEBBQADggEPADCCAQoCggEBAJ+whH02EO4jNVsy+CO2rIhYGDLtC/9uc3XuSHau Oct 11 04:02:44 localhost certmonger[38891]: w99DEEOvrYu3PMFfwQKQS62rzO0147lcT6x26xxLiS81cukIMcUp8BeBrJPzd2Ex Oct 11 04:02:44 localhost certmonger[38891]: lqvI9qGHO5q7N4CaJjqw2ASKRcQcKniJo6DR459OFINbjNqxV1qMmJ8ok/5IQ5FJ Oct 11 04:02:44 localhost certmonger[38891]: 0UJ1duJdU4CjGHEVNj0yh7YNE/x28+jL8/UB3rEvc7PfALe9Z/N2iQ4thSN6cWTn Oct 11 04:02:44 localhost certmonger[38891]: WaMLuxEAinv6AjLyIiJOpdUS14NM3IxsWbnCbRiXTFo/OLXAZ1rbMX0MBnQWp259 Oct 11 04:02:44 localhost certmonger[38891]: NxX664mrUCsi7w0ktsCMwjXJRjeSHSZCtKCHDg3BNzdqC/kCAwEAAaOCAd0wggHZ Oct 11 04:02:44 localhost certmonger[38891]: MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4w Oct 11 04:02:44 localhost certmonger[38891]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Oct 11 04:02:44 localhost certmonger[38891]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Oct 11 04:02:44 localhost certmonger[38891]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Oct 11 04:02:44 localhost certmonger[38891]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Oct 11 04:02:44 localhost certmonger[38891]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFKZ5EOUkbgCa4MuuerRCvDuGRn53 Oct 11 04:02:44 localhost certmonger[38891]: MIG2BgNVHREEga4wgauCHm5wMDAwNTQ4MTAxMi5jdGxwbGFuZS5vb28udGVzdKA8 Oct 11 04:02:44 localhost certmonger[38891]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NDgxMDEyLmN0bHBsYW5lLm9vby50 Oct 11 04:02:44 localhost certmonger[38891]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Oct 11 04:02:44 localhost certmonger[38891]: KDAmGwRIVFRQGx5ucDAwMDU0ODEwMTIuY3RscGxhbmUub29vLnRlc3QwDQYJKoZI Oct 11 04:02:44 localhost certmonger[38891]: hvcNAQELBQADggGBACa906aw3DOP0m7i8YlWwjupjHnzLhMJrk4CsM+4kFWB7RM0 Oct 11 04:02:44 localhost certmonger[38891]: mXxbvF0/Ut5hzOVw8HEyWQevvR/3ocCJv5FxrgCQ5DDOnYYJ8CYrH2QDoiXBFm2/ Oct 11 04:02:44 localhost certmonger[38891]: qwgOB0OJHdO8KP8V6jTep701qD7nDF6jmUcquyxUtbIBIP4O0hX9ELhzgwPD8WhW Oct 11 04:02:44 localhost certmonger[38891]: EyBqtO8FL+/THhjcLyoYZwYSoMN6ft196CKJ7vrcMp3P1JHZ0B2AuvDG2b45T/w8 Oct 11 04:02:44 localhost certmonger[38891]: 8MQmhOlkqibcbusmFa0UgYgNK5rK++AivwqL7YFUXMNBm4mhmNLB4M3j0g/Zp0Dc Oct 11 04:02:44 localhost certmonger[38891]: FCA29ZssfpTx9ZuUobZSRtDxTgTEq1QLomATj54t8dy5Y/kTS2lyZ6H1xv+zGID/ Oct 11 04:02:44 localhost certmonger[38891]: ZBSr+gaFJPjee/BhREMp9Z6aVbaW6hbPCNNy3Nodu2CpmyYoPBhMMOlOOKRIH928 Oct 11 04:02:44 localhost certmonger[38891]: ZQoL9Ubxi3yx1PpahVjyN+KXm2iOEwclfTXssMR81GoDjAY4MiQkCu6iHouhCCU2 Oct 11 04:02:44 localhost certmonger[38891]: s0MFy0drS0HcS0Z5vQ== Oct 11 04:02:44 localhost certmonger[38891]: -----END CERTIFICATE----- Oct 11 04:02:44 localhost certmonger[38891]: ". Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] No hooks set for pre-save command. Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost certmonger[39497]: Certificate in file "/etc/pki/tls/certs/httpd-ctlplane.crt" issued by CA and saved. Oct 11 04:02:44 localhost certmonger[38891]: 2025-10-11 08:02:44 [38891] Wrote to /var/lib/certmonger/requests/20251011080243 Oct 11 04:02:44 localhost systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 11 04:02:45 localhost systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 11 04:02:45 localhost systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Oct 11 04:02:45 localhost systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Oct 11 04:02:45 localhost python3[39517]: ansible-certificate_request Invoked with name=httpd-storage dns=['np0005481012.storage.ooo.test'] principal=['HTTP/np0005481012.storage.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage.crt /etc/pki/tls/certs/httpd/httpd-storage.crt#012cp /etc/pki/tls/private/httpd-storage.key /etc/pki/tls/private/httpd/httpd-storage.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 04:02:45 localhost certmonger[38891]: 2025-10-11 08:02:45 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[38891]: 2025-10-11 08:02:45 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[38891]: 2025-10-11 08:02:45 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[38891]: 2025-10-11 08:02:45 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[38891]: 2025-10-11 08:02:45 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[38891]: 2025-10-11 08:02:45 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[38891]: 2025-10-11 08:02:45 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[38891]: 2025-10-11 08:02:45 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[38891]: 2025-10-11 08:02:45 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[38891]: 2025-10-11 08:02:45 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[38891]: 2025-10-11 08:02:45 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[38891]: 2025-10-11 08:02:45 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[38891]: 2025-10-11 08:02:45 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[38891]: 2025-10-11 08:02:45 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[38891]: 2025-10-11 08:02:45 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[38891]: 2025-10-11 08:02:45 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[38891]: 2025-10-11 08:02:45 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[39534]: 2025-10-11 08:02:45 [39534] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481012.storage.ooo.test" for child. Oct 11 04:02:45 localhost certmonger[39534]: 2025-10-11 08:02:45 [39534] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481012.storage.ooo.test Oct 11 04:02:45 localhost certmonger[39534]: " for child. Oct 11 04:02:45 localhost certmonger[39534]: 2025-10-11 08:02:45 [39534] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005481012.storage.ooo.test@OOO.TEST Oct 11 04:02:45 localhost certmonger[39534]: " for child. Oct 11 04:02:45 localhost certmonger[39534]: 2025-10-11 08:02:45 [39534] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 04:02:45 localhost certmonger[39534]: 2025-10-11 08:02:45 [39534] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 04:02:45 localhost certmonger[39534]: MIIDwjCCAqoCAQAwKDEmMCQGA1UEAxMdbnAwMDA1NDgxMDEyLnN0b3JhZ2Uub29v Oct 11 04:02:45 localhost certmonger[39534]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCVKBvMpnOsov2/ Oct 11 04:02:45 localhost certmonger[39534]: 60BBNWOqhpXOxV1Nk2DX9raN/Ic62FkYwvD+Qaq1WEIzBICovVuHx8EkPJv8ERUS Oct 11 04:02:45 localhost certmonger[39534]: q7wpJowJkSJw7hNBoFLAnu4g7/1qNsv5wM7ZsxHvVwgTJB7zerhDRYF0waDm0Wiq Oct 11 04:02:45 localhost certmonger[39534]: KZZpuR1HpxYZfIb+Vq7TCvK7UJVtCZX/GnCrQJ9gacwK1DehQRm3PmltQfAdMhbe Oct 11 04:02:45 localhost certmonger[39534]: 0H0JD0/EhQUsxCz4bJg+3HlEx0nLAIMVo1Vingf2BEVi2JoByX9ABr0XJ//pkBib Oct 11 04:02:45 localhost certmonger[39534]: X+zbKeKHNVcWqYTIv7bTPcjKpyvkjaAKcYB99Ngi3nRU7dlpXxVkh712PHRrxZIT Oct 11 04:02:45 localhost certmonger[39534]: 8xVFo3k/AgMBAAGgggFTMCsGCSqGSIb3DQEJFDEeHhwAMgAwADIANQAxADAAMQAx Oct 11 04:02:45 localhost certmonger[39534]: ADAAOAAwADIANAA1MIIBIgYJKoZIhvcNAQkOMYIBEzCCAQ8wCwYDVR0PBAQDAgWg Oct 11 04:02:45 localhost certmonger[39534]: MIGzBgNVHREEgaswgaiCHW5wMDAwNTQ4MTAxMi5zdG9yYWdlLm9vby50ZXN0oDsG Oct 11 04:02:45 localhost certmonger[39534]: CisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU0ODEwMTIuc3RvcmFnZS5vb28udGVz Oct 11 04:02:45 localhost certmonger[39534]: dEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5URVNUoTAwLqADAgEBoScw Oct 11 04:02:45 localhost certmonger[39534]: JRsESFRUUBsdbnAwMDA1NDgxMDEyLnN0b3JhZ2Uub29vLnRlc3QwHQYDVR0lBBYw Oct 11 04:02:45 localhost certmonger[39534]: FAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFMM1 Oct 11 04:02:45 localhost certmonger[39534]: hLHhoodyEjTizNPhNK/Z5k+yMA0GCSqGSIb3DQEBCwUAA4IBAQAqOV5sE7KQgNH5 Oct 11 04:02:45 localhost certmonger[39534]: B1ck/GT768gq8BongLTOovO9k4+iBl1x0NsDZ+a8+EUHRW1Jpp4MwSy7/baolO08 Oct 11 04:02:45 localhost certmonger[39534]: eWTufakziF7y1kL18b5WaW/m/p1LEOJOPRh0ZjyI/rTMrlTCWqXz+dua7/C8z7IE Oct 11 04:02:45 localhost certmonger[39534]: mrR2XNuq9FJdyehdU9CTVoxRemdfd7ry7/4up68D996tYtR32GEdi3iL9oepHIy2 Oct 11 04:02:45 localhost certmonger[39534]: VsfzJdeZ7D3buNiyMhZDTjtBRqSNma4QsAngPmP/diFmBu6hw1u46CriTWXRMPb5 Oct 11 04:02:45 localhost certmonger[39534]: e0Lfik6b6o8zS4zuZoRDUuFl1alkq87vTzi3qxoQ5ewHpLjRiwrEEah8/IPCjZ22 Oct 11 04:02:45 localhost certmonger[39534]: fk2G/CS+ Oct 11 04:02:45 localhost certmonger[39534]: -----END CERTIFICATE REQUEST----- Oct 11 04:02:45 localhost certmonger[39534]: " for child. Oct 11 04:02:45 localhost certmonger[39534]: 2025-10-11 08:02:45 [39534] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCVKBvMpnOsov2/60BBNWOqhpXOxV1Nk2DX9raN/Ic62FkYwvD+Qaq1WEIzBICovVuHx8EkPJv8ERUSq7wpJowJkSJw7hNBoFLAnu4g7/1qNsv5wM7ZsxHvVwgTJB7zerhDRYF0waDm0WiqKZZpuR1HpxYZfIb+Vq7TCvK7UJVtCZX/GnCrQJ9gacwK1DehQRm3PmltQfAdMhbe0H0JD0/EhQUsxCz4bJg+3HlEx0nLAIMVo1Vingf2BEVi2JoByX9ABr0XJ//pkBibX+zbKeKHNVcWqYTIv7bTPcjKpyvkjaAKcYB99Ngi3nRU7dlpXxVkh712PHRrxZIT8xVFo3k/AgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAGoJKBZ8lGuars+H2XpYkG7kaQdlRzRP6SIi7adNsmvIf5LzvlQ9V9iPWdac30z9s7MW2btdEWW+nBIcq5OINqZ+jT0NvyOV35O4JL/lkcU4iVLpwMdXXkdT4rnlJ3AZuFEb9JeG5VL89xUa8/VsgCd/Ocx9IjF4FsGERzuP+UvwS7p5lWunZvlV6fnp+MJZoDmGO1daNZ7KIaO/r3T7oTzKPoyPMnwQ2QPkwAIQgXgAt2MfHRmFYwxd1hLgXrCOd2Onx3KTM1nOIc60CjWBuTzmbS01g6f2kKslh4MlMvx+CLFGbDHy42PPwLr/pGIteVF+MfCNpyTRmOT8AGHQYGw==" for child. Oct 11 04:02:45 localhost certmonger[39534]: 2025-10-11 08:02:45 [39534] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAlSgbzKZzrKL9v+tAQTVjqoaVzsVdTZNg1/a2jfyHOthZGMLw/kGqtVhCMwSAqL1bh8fBJDyb/BEVEqu8KSaMCZEicO4TQaBSwJ7uIO/9ajbL+cDO2bMR71cIEyQe83q4Q0WBdMGg5tFoqimWabkdR6cWGXyG/lau0wryu1CVbQmV/xpwq0CfYGnMCtQ3oUEZtz5pbUHwHTIW3tB9CQ9PxIUFLMQs+GyYPtx5RMdJywCDFaNVYp4H9gRFYtiaAcl/QAa9Fyf/6ZAYm1/s2ynihzVXFqmEyL+20z3Iyqcr5I2gCnGAffTYIt50VO3ZaV8VZIe9djx0a8WSE/MVRaN5PwIDAQAB" for child. Oct 11 04:02:45 localhost certmonger[39534]: 2025-10-11 08:02:45 [39534] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 04:02:45 localhost certmonger[39534]: 2025-10-11 08:02:45 [39534] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 04:02:45 localhost certmonger[39534]: 2025-10-11 08:02:45 [39534] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 04:02:45 localhost certmonger[39534]: 2025-10-11 08:02:45 [39534] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:45 localhost certmonger[39534]: 2025-10-11 08:02:45 [39534] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:45 localhost certmonger[38891]: 2025-10-11 08:02:45 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[39534]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost certmonger[39534]: Certificate: "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" Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Certificate submission still ongoing. Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Certificate submission attempt complete. Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Child status = 0. Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Child output: Oct 11 04:02:46 localhost certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 04:02:46 localhost certmonger[38891]: MIIFRTCCA62gAwIBAgIBEzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:46 localhost certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:46 localhost certmonger[38891]: MDI0NloXDTI3MTAxMjA4MDI0NlowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Oct 11 04:02:46 localhost certmonger[38891]: BAMMHW5wMDAwNTQ4MTAxMi5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Oct 11 04:02:46 localhost certmonger[38891]: AQEFAAOCAQ8AMIIBCgKCAQEAlSgbzKZzrKL9v+tAQTVjqoaVzsVdTZNg1/a2jfyH Oct 11 04:02:46 localhost certmonger[38891]: OthZGMLw/kGqtVhCMwSAqL1bh8fBJDyb/BEVEqu8KSaMCZEicO4TQaBSwJ7uIO/9 Oct 11 04:02:46 localhost certmonger[38891]: ajbL+cDO2bMR71cIEyQe83q4Q0WBdMGg5tFoqimWabkdR6cWGXyG/lau0wryu1CV Oct 11 04:02:46 localhost certmonger[38891]: bQmV/xpwq0CfYGnMCtQ3oUEZtz5pbUHwHTIW3tB9CQ9PxIUFLMQs+GyYPtx5RMdJ Oct 11 04:02:46 localhost certmonger[38891]: ywCDFaNVYp4H9gRFYtiaAcl/QAa9Fyf/6ZAYm1/s2ynihzVXFqmEyL+20z3Iyqcr Oct 11 04:02:46 localhost certmonger[38891]: 5I2gCnGAffTYIt50VO3ZaV8VZIe9djx0a8WSE/MVRaN5PwIDAQABo4IB2jCCAdYw Oct 11 04:02:46 localhost certmonger[38891]: HwYDVR0jBBgwFoAUpmo3qgn1Gyf8p8PaklOw1w0+KGkwOgYIKwYBBQUHAQEELjAs Oct 11 04:02:46 localhost certmonger[38891]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Oct 11 04:02:46 localhost certmonger[38891]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Oct 11 04:02:46 localhost certmonger[38891]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Oct 11 04:02:46 localhost certmonger[38891]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Oct 11 04:02:46 localhost certmonger[38891]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUQcTkH/I5x+xxXlwkbEjvn3AjKSYw Oct 11 04:02:46 localhost certmonger[38891]: gbMGA1UdEQSBqzCBqIIdbnAwMDA1NDgxMDEyLnN0b3JhZ2Uub29vLnRlc3SgOwYK Oct 11 04:02:46 localhost certmonger[38891]: KwYBBAGCNxQCA6AtDCtIVFRQL25wMDAwNTQ4MTAxMi5zdG9yYWdlLm9vby50ZXN0 Oct 11 04:02:46 localhost certmonger[38891]: QE9PTy5URVNUoEoGBisGAQUCAqBAMD6gChsIT09PLlRFU1ShMDAuoAMCAQGhJzAl Oct 11 04:02:46 localhost certmonger[38891]: GwRIVFRQGx1ucDAwMDU0ODEwMTIuc3RvcmFnZS5vb28udGVzdDANBgkqhkiG9w0B Oct 11 04:02:46 localhost certmonger[38891]: AQsFAAOCAYEAoOdlvX9CclZ7PFESv2lU77J1WwyUzG35h+J7SqU7V59HeomVErRl Oct 11 04:02:46 localhost certmonger[38891]: rfyXcaYiCGD1CsrTn2k09A4EGMQEOqQIFN3CkyMEAn6/S+rSxmH0rOE+vH0OwfJ8 Oct 11 04:02:46 localhost certmonger[38891]: 9Eq49JBTHbk07YVDB02ao8DH8IN6K8Wnd1PfBwndyIXhGkbNzkjJqmOF93+TyWuw Oct 11 04:02:46 localhost certmonger[38891]: hYAlnPkP75R3UIzsB0bsq0P/B1seKMkHpOOg1q0yo1VUh+isuHPwq5kcctWyLDXJ Oct 11 04:02:46 localhost certmonger[38891]: OFdO5KxlDvwT6VKFifXZosWIf5qN0bpgddgrPFL0x6AXUk3i+k/VkckxwIQjEHb+ Oct 11 04:02:46 localhost certmonger[38891]: 9fpvnke3szk453oU//LA2UG2EYObLYCuPXUV+2Fe3nlr8yP2FeMIknAe0reWjsNg Oct 11 04:02:46 localhost certmonger[38891]: DGGo7I6+gjD3YPYJLz8N0hN5koV7DsXl3n+Xj3ihSEozazSmfq9nxkILfy+VhCeq Oct 11 04:02:46 localhost certmonger[38891]: 1lwmtVTwXMDz5KCWb9SS0zjm9XXz6miTWbviF4+h3d54YJrIkm2QkxSLJXE6pqv+ Oct 11 04:02:46 localhost certmonger[38891]: EUDE0i2iVARj Oct 11 04:02:46 localhost certmonger[38891]: -----END CERTIFICATE----- Oct 11 04:02:46 localhost certmonger[38891]: " Oct 11 04:02:46 localhost certmonger[39537]: 2025-10-11 08:02:46 [39537] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 04:02:46 localhost certmonger[39537]: MIIFRTCCA62gAwIBAgIBEzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:46 localhost certmonger[39537]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:46 localhost certmonger[39537]: MDI0NloXDTI3MTAxMjA4MDI0NlowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Oct 11 04:02:46 localhost certmonger[39537]: BAMMHW5wMDAwNTQ4MTAxMi5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Oct 11 04:02:46 localhost certmonger[39537]: AQEFAAOCAQ8AMIIBCgKCAQEAlSgbzKZzrKL9v+tAQTVjqoaVzsVdTZNg1/a2jfyH Oct 11 04:02:46 localhost certmonger[39537]: OthZGMLw/kGqtVhCMwSAqL1bh8fBJDyb/BEVEqu8KSaMCZEicO4TQaBSwJ7uIO/9 Oct 11 04:02:46 localhost certmonger[39537]: ajbL+cDO2bMR71cIEyQe83q4Q0WBdMGg5tFoqimWabkdR6cWGXyG/lau0wryu1CV Oct 11 04:02:46 localhost certmonger[39537]: bQmV/xpwq0CfYGnMCtQ3oUEZtz5pbUHwHTIW3tB9CQ9PxIUFLMQs+GyYPtx5RMdJ Oct 11 04:02:46 localhost certmonger[39537]: ywCDFaNVYp4H9gRFYtiaAcl/QAa9Fyf/6ZAYm1/s2ynihzVXFqmEyL+20z3Iyqcr Oct 11 04:02:46 localhost certmonger[39537]: 5I2gCnGAffTYIt50VO3ZaV8VZIe9djx0a8WSE/MVRaN5PwIDAQABo4IB2jCCAdYw Oct 11 04:02:46 localhost certmonger[39537]: HwYDVR0jBBgwFoAUpmo3qgn1Gyf8p8PaklOw1w0+KGkwOgYIKwYBBQUHAQEELjAs Oct 11 04:02:46 localhost certmonger[39537]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Oct 11 04:02:46 localhost certmonger[39537]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Oct 11 04:02:46 localhost certmonger[39537]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Oct 11 04:02:46 localhost certmonger[39537]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Oct 11 04:02:46 localhost certmonger[39537]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUQcTkH/I5x+xxXlwkbEjvn3AjKSYw Oct 11 04:02:46 localhost certmonger[39537]: gbMGA1UdEQSBqzCBqIIdbnAwMDA1NDgxMDEyLnN0b3JhZ2Uub29vLnRlc3SgOwYK Oct 11 04:02:46 localhost certmonger[39537]: KwYBBAGCNxQCA6AtDCtIVFRQL25wMDAwNTQ4MTAxMi5zdG9yYWdlLm9vby50ZXN0 Oct 11 04:02:46 localhost certmonger[39537]: QE9PTy5URVNUoEoGBisGAQUCAqBAMD6gChsIT09PLlRFU1ShMDAuoAMCAQGhJzAl Oct 11 04:02:46 localhost certmonger[39537]: GwRIVFRQGx1ucDAwMDU0ODEwMTIuc3RvcmFnZS5vb28udGVzdDANBgkqhkiG9w0B Oct 11 04:02:46 localhost certmonger[39537]: AQsFAAOCAYEAoOdlvX9CclZ7PFESv2lU77J1WwyUzG35h+J7SqU7V59HeomVErRl Oct 11 04:02:46 localhost certmonger[39537]: rfyXcaYiCGD1CsrTn2k09A4EGMQEOqQIFN3CkyMEAn6/S+rSxmH0rOE+vH0OwfJ8 Oct 11 04:02:46 localhost certmonger[39537]: 9Eq49JBTHbk07YVDB02ao8DH8IN6K8Wnd1PfBwndyIXhGkbNzkjJqmOF93+TyWuw Oct 11 04:02:46 localhost certmonger[39537]: hYAlnPkP75R3UIzsB0bsq0P/B1seKMkHpOOg1q0yo1VUh+isuHPwq5kcctWyLDXJ Oct 11 04:02:46 localhost certmonger[39537]: OFdO5KxlDvwT6VKFifXZosWIf5qN0bpgddgrPFL0x6AXUk3i+k/VkckxwIQjEHb+ Oct 11 04:02:46 localhost certmonger[39537]: 9fpvnke3szk453oU//LA2UG2EYObLYCuPXUV+2Fe3nlr8yP2FeMIknAe0reWjsNg Oct 11 04:02:46 localhost certmonger[39537]: DGGo7I6+gjD3YPYJLz8N0hN5koV7DsXl3n+Xj3ihSEozazSmfq9nxkILfy+VhCeq Oct 11 04:02:46 localhost certmonger[39537]: 1lwmtVTwXMDz5KCWb9SS0zjm9XXz6miTWbviF4+h3d54YJrIkm2QkxSLJXE6pqv+ Oct 11 04:02:46 localhost certmonger[39537]: EUDE0i2iVARj Oct 11 04:02:46 localhost certmonger[39537]: -----END CERTIFICATE----- Oct 11 04:02:46 localhost certmonger[39537]: ". Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Certificate submission still ongoing. Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Certificate submission postprocessing complete. Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Child status = 0. Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Child output: Oct 11 04:02:46 localhost certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nEUDE0i2iVARj\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 04:02:46 localhost certmonger[38891]: " Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 04:02:46 localhost certmonger[38891]: MIIFRTCCA62gAwIBAgIBEzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:46 localhost certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:46 localhost certmonger[38891]: MDI0NloXDTI3MTAxMjA4MDI0NlowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Oct 11 04:02:46 localhost certmonger[38891]: BAMMHW5wMDAwNTQ4MTAxMi5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Oct 11 04:02:46 localhost certmonger[38891]: AQEFAAOCAQ8AMIIBCgKCAQEAlSgbzKZzrKL9v+tAQTVjqoaVzsVdTZNg1/a2jfyH Oct 11 04:02:46 localhost certmonger[38891]: OthZGMLw/kGqtVhCMwSAqL1bh8fBJDyb/BEVEqu8KSaMCZEicO4TQaBSwJ7uIO/9 Oct 11 04:02:46 localhost certmonger[38891]: ajbL+cDO2bMR71cIEyQe83q4Q0WBdMGg5tFoqimWabkdR6cWGXyG/lau0wryu1CV Oct 11 04:02:46 localhost certmonger[38891]: bQmV/xpwq0CfYGnMCtQ3oUEZtz5pbUHwHTIW3tB9CQ9PxIUFLMQs+GyYPtx5RMdJ Oct 11 04:02:46 localhost certmonger[38891]: ywCDFaNVYp4H9gRFYtiaAcl/QAa9Fyf/6ZAYm1/s2ynihzVXFqmEyL+20z3Iyqcr Oct 11 04:02:46 localhost certmonger[38891]: 5I2gCnGAffTYIt50VO3ZaV8VZIe9djx0a8WSE/MVRaN5PwIDAQABo4IB2jCCAdYw Oct 11 04:02:46 localhost certmonger[38891]: HwYDVR0jBBgwFoAUpmo3qgn1Gyf8p8PaklOw1w0+KGkwOgYIKwYBBQUHAQEELjAs Oct 11 04:02:46 localhost certmonger[38891]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Oct 11 04:02:46 localhost certmonger[38891]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Oct 11 04:02:46 localhost certmonger[38891]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Oct 11 04:02:46 localhost certmonger[38891]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Oct 11 04:02:46 localhost certmonger[38891]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUQcTkH/I5x+xxXlwkbEjvn3AjKSYw Oct 11 04:02:46 localhost certmonger[38891]: gbMGA1UdEQSBqzCBqIIdbnAwMDA1NDgxMDEyLnN0b3JhZ2Uub29vLnRlc3SgOwYK Oct 11 04:02:46 localhost certmonger[38891]: KwYBBAGCNxQCA6AtDCtIVFRQL25wMDAwNTQ4MTAxMi5zdG9yYWdlLm9vby50ZXN0 Oct 11 04:02:46 localhost certmonger[38891]: QE9PTy5URVNUoEoGBisGAQUCAqBAMD6gChsIT09PLlRFU1ShMDAuoAMCAQGhJzAl Oct 11 04:02:46 localhost certmonger[38891]: GwRIVFRQGx1ucDAwMDU0ODEwMTIuc3RvcmFnZS5vb28udGVzdDANBgkqhkiG9w0B Oct 11 04:02:46 localhost certmonger[38891]: AQsFAAOCAYEAoOdlvX9CclZ7PFESv2lU77J1WwyUzG35h+J7SqU7V59HeomVErRl Oct 11 04:02:46 localhost certmonger[38891]: rfyXcaYiCGD1CsrTn2k09A4EGMQEOqQIFN3CkyMEAn6/S+rSxmH0rOE+vH0OwfJ8 Oct 11 04:02:46 localhost certmonger[38891]: 9Eq49JBTHbk07YVDB02ao8DH8IN6K8Wnd1PfBwndyIXhGkbNzkjJqmOF93+TyWuw Oct 11 04:02:46 localhost certmonger[38891]: hYAlnPkP75R3UIzsB0bsq0P/B1seKMkHpOOg1q0yo1VUh+isuHPwq5kcctWyLDXJ Oct 11 04:02:46 localhost certmonger[38891]: OFdO5KxlDvwT6VKFifXZosWIf5qN0bpgddgrPFL0x6AXUk3i+k/VkckxwIQjEHb+ Oct 11 04:02:46 localhost certmonger[38891]: 9fpvnke3szk453oU//LA2UG2EYObLYCuPXUV+2Fe3nlr8yP2FeMIknAe0reWjsNg Oct 11 04:02:46 localhost certmonger[38891]: DGGo7I6+gjD3YPYJLz8N0hN5koV7DsXl3n+Xj3ihSEozazSmfq9nxkILfy+VhCeq Oct 11 04:02:46 localhost certmonger[38891]: 1lwmtVTwXMDz5KCWb9SS0zjm9XXz6miTWbviF4+h3d54YJrIkm2QkxSLJXE6pqv+ Oct 11 04:02:46 localhost certmonger[38891]: EUDE0i2iVARj Oct 11 04:02:46 localhost certmonger[38891]: -----END CERTIFICATE----- Oct 11 04:02:46 localhost certmonger[38891]: ". Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] No hooks set for pre-save command. Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[39545]: Certificate in file "/etc/pki/tls/certs/httpd-storage.crt" issued by CA and saved. Oct 11 04:02:46 localhost certmonger[38891]: 2025-10-11 08:02:46 [38891] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:46 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost python3[39561]: ansible-certificate_request Invoked with name=httpd-storage_mgmt dns=['np0005481012.storagemgmt.ooo.test'] principal=['HTTP/np0005481012.storagemgmt.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage_mgmt.crt /etc/pki/tls/certs/httpd/httpd-storage_mgmt.crt#012cp /etc/pki/tls/private/httpd-storage_mgmt.key /etc/pki/tls/private/httpd/httpd-storage_mgmt.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost certmonger[38891]: 2025-10-11 08:02:47 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[38891]: 2025-10-11 08:02:47 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[38891]: 2025-10-11 08:02:47 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[38891]: 2025-10-11 08:02:47 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[38891]: 2025-10-11 08:02:47 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[38891]: 2025-10-11 08:02:47 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[38891]: 2025-10-11 08:02:47 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[38891]: 2025-10-11 08:02:47 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[38891]: 2025-10-11 08:02:47 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost certmonger[38891]: 2025-10-11 08:02:47 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[38891]: 2025-10-11 08:02:47 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[38891]: 2025-10-11 08:02:47 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[38891]: 2025-10-11 08:02:47 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[38891]: 2025-10-11 08:02:47 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[38891]: 2025-10-11 08:02:47 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost certmonger[38891]: 2025-10-11 08:02:47 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[38891]: 2025-10-11 08:02:47 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[39571]: 2025-10-11 08:02:47 [39571] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481012.storagemgmt.ooo.test" for child. Oct 11 04:02:47 localhost certmonger[39571]: 2025-10-11 08:02:47 [39571] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481012.storagemgmt.ooo.test Oct 11 04:02:47 localhost certmonger[39571]: " for child. Oct 11 04:02:47 localhost certmonger[39571]: 2025-10-11 08:02:47 [39571] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005481012.storagemgmt.ooo.test@OOO.TEST Oct 11 04:02:47 localhost certmonger[39571]: " for child. Oct 11 04:02:47 localhost certmonger[39571]: 2025-10-11 08:02:47 [39571] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 04:02:47 localhost certmonger[39571]: 2025-10-11 08:02:47 [39571] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 04:02:47 localhost certmonger[39571]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDEyLnN0b3JhZ2VtZ210 Oct 11 04:02:47 localhost certmonger[39571]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuVsd/S/Z Oct 11 04:02:47 localhost certmonger[39571]: 4ZlFnidal8rrFInh0IXM6uZnK6N7tVJ77NJ5ZnkhuFA7WprYY3AWmzsXqDjzVhUq Oct 11 04:02:47 localhost certmonger[39571]: IFtOVs2XnvEgfYfGbB2p/lH6Ljbx1Pa2JbW8n3VDlIP6C4L+G/WVkBx4+4ap7krv Oct 11 04:02:47 localhost certmonger[39571]: zIX2JDwgTQuIzeOZ4+ZMYD89ol9Fi0uFWI4JdwQ0VC39BB4yTxVaX1I1Sq0tByEq Oct 11 04:02:47 localhost certmonger[39571]: r7K10gHCiqoe+//aUsPpj2i5OpEWYnd4F4QEcaYBLn++iheCOGqome0m7xyYhcId Oct 11 04:02:47 localhost certmonger[39571]: E2ODcsSbF+0TzyDgvbHdX7GKJuCbchijVaql6+WtJ9tSmXWcTei61Y+e7sBJllEn Oct 11 04:02:47 localhost certmonger[39571]: 6aHNoJOFlRe0FwIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 04:02:47 localhost certmonger[39571]: ADEAMQAwADgAMAAyADQANzCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Oct 11 04:02:47 localhost certmonger[39571]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU0ODEwMTIuc3RvcmFnZW1nbXQub29v Oct 11 04:02:47 localhost certmonger[39571]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTQ4MTAxMi5zdG9yYWdl Oct 11 04:02:47 localhost certmonger[39571]: bWdtdC5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Oct 11 04:02:47 localhost certmonger[39571]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NDgxMDEyLnN0b3JhZ2VtZ210Lm9v Oct 11 04:02:47 localhost certmonger[39571]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Oct 11 04:02:47 localhost certmonger[39571]: AjAAMB0GA1UdDgQWBBR54Kqo2i/vXwewiQkVeTJje2GhjzANBgkqhkiG9w0BAQsF Oct 11 04:02:47 localhost certmonger[39571]: AAOCAQEAAxPZhrln+9V1D6FQuNGXAGmn+rWCryJH6UwE3Yrc63RmVgHEIb4B3w5D Oct 11 04:02:47 localhost certmonger[39571]: uH4TS/NEhrPYgtA3J/ZnoKZ3Kun0o/oWtdGse+f0ac0sMW0RgkO2rrZ5KIK+wb65 Oct 11 04:02:47 localhost certmonger[39571]: l8ZUGdjAIR2dCqXB6lGJDtYp/EjlQsnyOnnFtXALd0hVZDy0z8wVnYt4DWxn/pm1 Oct 11 04:02:47 localhost certmonger[39571]: DFKxTLrQq/3kpYbt0rawLzgTsbF8gwmMoefQ0bmnDPFPYdfi4FFRFCF0vpLcmbzq Oct 11 04:02:47 localhost certmonger[39571]: aA1n3IOQ1WyajA9U/C+h2+u2MaX61AC3SgZbkVDJjouKpyb+Pk18HH9XsTD+dRcf Oct 11 04:02:47 localhost certmonger[39571]: WrIXtMj2QB/a5+X4E1zGBSLJrN4MOg== Oct 11 04:02:47 localhost certmonger[39571]: -----END CERTIFICATE REQUEST----- Oct 11 04:02:47 localhost certmonger[39571]: " for child. Oct 11 04:02:47 localhost certmonger[39571]: 2025-10-11 08:02:47 [39571] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 04:02:47 localhost certmonger[39571]: 2025-10-11 08:02:47 [39571] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuVsd/S/Z4ZlFnidal8rrFInh0IXM6uZnK6N7tVJ77NJ5ZnkhuFA7WprYY3AWmzsXqDjzVhUqIFtOVs2XnvEgfYfGbB2p/lH6Ljbx1Pa2JbW8n3VDlIP6C4L+G/WVkBx4+4ap7krvzIX2JDwgTQuIzeOZ4+ZMYD89ol9Fi0uFWI4JdwQ0VC39BB4yTxVaX1I1Sq0tByEqr7K10gHCiqoe+//aUsPpj2i5OpEWYnd4F4QEcaYBLn++iheCOGqome0m7xyYhcIdE2ODcsSbF+0TzyDgvbHdX7GKJuCbchijVaql6+WtJ9tSmXWcTei61Y+e7sBJllEn6aHNoJOFlRe0FwIDAQAB" for child. Oct 11 04:02:47 localhost certmonger[39571]: 2025-10-11 08:02:47 [39571] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 04:02:47 localhost certmonger[39571]: 2025-10-11 08:02:47 [39571] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 04:02:47 localhost certmonger[39571]: 2025-10-11 08:02:47 [39571] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 04:02:47 localhost certmonger[39571]: 2025-10-11 08:02:47 [39571] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:47 localhost certmonger[39571]: 2025-10-11 08:02:47 [39571] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:47 localhost certmonger[38891]: 2025-10-11 08:02:47 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost certmonger[39571]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:47 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost certmonger[39571]: Certificate: "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" Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Certificate submission still ongoing. Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Certificate submission attempt complete. Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Child status = 0. Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Child output: Oct 11 04:02:48 localhost certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 04:02:48 localhost certmonger[38891]: MIIFVTCCA72gAwIBAgIBFjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:48 localhost certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:48 localhost certmonger[38891]: MDI0N1oXDTI3MTAxMjA4MDI0N1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 04:02:48 localhost certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Oct 11 04:02:48 localhost certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBALlbHf0v2eGZRZ4nWpfK6xSJ4dCFzOrmZyuj Oct 11 04:02:48 localhost certmonger[38891]: e7VSe+zSeWZ5IbhQO1qa2GNwFps7F6g481YVKiBbTlbNl57xIH2Hxmwdqf5R+i42 Oct 11 04:02:48 localhost certmonger[38891]: 8dT2tiW1vJ91Q5SD+guC/hv1lZAcePuGqe5K78yF9iQ8IE0LiM3jmePmTGA/PaJf Oct 11 04:02:48 localhost certmonger[38891]: RYtLhViOCXcENFQt/QQeMk8VWl9SNUqtLQchKq+ytdIBwoqqHvv/2lLD6Y9ouTqR Oct 11 04:02:48 localhost certmonger[38891]: FmJ3eBeEBHGmAS5/vooXgjhqqJntJu8cmIXCHRNjg3LEmxftE88g4L2x3V+xiibg Oct 11 04:02:48 localhost certmonger[38891]: m3IYo1WqpevlrSfbUpl1nE3outWPnu7ASZZRJ+mhzaCThZUXtBcCAwEAAaOCAeYw Oct 11 04:02:48 localhost certmonger[38891]: ggHiMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 04:02:48 localhost certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 04:02:48 localhost certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 04:02:48 localhost certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 04:02:48 localhost certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 04:02:48 localhost certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLwT6kuHAxcMZ9ii++5tN6LX Oct 11 04:02:48 localhost certmonger[38891]: vuLdMIG/BgNVHREEgbcwgbSCIW5wMDAwNTQ4MTAxMi5zdG9yYWdlbWdtdC5vb28u Oct 11 04:02:48 localhost certmonger[38891]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NDgxMDEyLnN0b3JhZ2Vt Oct 11 04:02:48 localhost certmonger[38891]: Z210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Oct 11 04:02:48 localhost certmonger[38891]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU0ODEwMTIuc3RvcmFnZW1nbXQub29v Oct 11 04:02:48 localhost certmonger[38891]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAENUsI2EC+Y0TfWgDvwuyVHKiA6MmcY9 Oct 11 04:02:48 localhost certmonger[38891]: UwIwwurCcBmo2vL5bsn7r9hKAG80Fhcv4oSHjymBOtJBSh33YBZCxppHGaei3b8+ Oct 11 04:02:48 localhost certmonger[38891]: Wb2XC/md6R9/grt+FHx8qCLlSKLHALbpm0w8EF9PLL04wbqSKI4xoEAlUJmjK0q5 Oct 11 04:02:48 localhost certmonger[38891]: C/Ya9RPyiBaOeIxUXfTNYwFUhXOWGooDnQ5Rm3hHyTCom5lCDKy+QIdrGbYEJhUs Oct 11 04:02:48 localhost certmonger[38891]: iYQx9nS4etoUtNPVVLqErOmPwEwR7khGJVu1eVz64vX8m37fLC3aqVNZBXpVueAG Oct 11 04:02:48 localhost certmonger[38891]: RmQ2bfeuAYmjHNF5ykcGYr0wdu2AI2SCFxNHUEuq1Nn/rvH0qSWMYsW46Jmp1QxP Oct 11 04:02:48 localhost certmonger[38891]: iRn0DGLxHsrhwmkdiD4B6l/pFa2OGBOxzQhsbiKyZf/d0AB0d+gVlVxz0b9vAFW1 Oct 11 04:02:48 localhost certmonger[38891]: ia2eAMnZRwauKBWL0VDxawtfKXzrwRRPNHAHY8KD5orEjIEFXJNZ4CDmpbfH1Rtl Oct 11 04:02:48 localhost certmonger[38891]: 8xY2yU4CdYhgglfWSSO9FqZV4MsxzE5i5g== Oct 11 04:02:48 localhost certmonger[38891]: -----END CERTIFICATE----- Oct 11 04:02:48 localhost certmonger[38891]: " Oct 11 04:02:48 localhost certmonger[39573]: 2025-10-11 08:02:48 [39573] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 04:02:48 localhost certmonger[39573]: MIIFVTCCA72gAwIBAgIBFjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:48 localhost certmonger[39573]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:48 localhost certmonger[39573]: MDI0N1oXDTI3MTAxMjA4MDI0N1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 04:02:48 localhost certmonger[39573]: BAMMIW5wMDAwNTQ4MTAxMi5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Oct 11 04:02:48 localhost certmonger[39573]: hvcNAQEBBQADggEPADCCAQoCggEBALlbHf0v2eGZRZ4nWpfK6xSJ4dCFzOrmZyuj Oct 11 04:02:48 localhost certmonger[39573]: e7VSe+zSeWZ5IbhQO1qa2GNwFps7F6g481YVKiBbTlbNl57xIH2Hxmwdqf5R+i42 Oct 11 04:02:48 localhost certmonger[39573]: 8dT2tiW1vJ91Q5SD+guC/hv1lZAcePuGqe5K78yF9iQ8IE0LiM3jmePmTGA/PaJf Oct 11 04:02:48 localhost certmonger[39573]: RYtLhViOCXcENFQt/QQeMk8VWl9SNUqtLQchKq+ytdIBwoqqHvv/2lLD6Y9ouTqR Oct 11 04:02:48 localhost certmonger[39573]: FmJ3eBeEBHGmAS5/vooXgjhqqJntJu8cmIXCHRNjg3LEmxftE88g4L2x3V+xiibg Oct 11 04:02:48 localhost certmonger[39573]: m3IYo1WqpevlrSfbUpl1nE3outWPnu7ASZZRJ+mhzaCThZUXtBcCAwEAAaOCAeYw Oct 11 04:02:48 localhost certmonger[39573]: ggHiMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 04:02:48 localhost certmonger[39573]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 04:02:48 localhost certmonger[39573]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 04:02:48 localhost certmonger[39573]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 04:02:48 localhost certmonger[39573]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 04:02:48 localhost certmonger[39573]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLwT6kuHAxcMZ9ii++5tN6LX Oct 11 04:02:48 localhost certmonger[39573]: vuLdMIG/BgNVHREEgbcwgbSCIW5wMDAwNTQ4MTAxMi5zdG9yYWdlbWdtdC5vb28u Oct 11 04:02:48 localhost certmonger[39573]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NDgxMDEyLnN0b3JhZ2Vt Oct 11 04:02:48 localhost certmonger[39573]: Z210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Oct 11 04:02:48 localhost certmonger[39573]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU0ODEwMTIuc3RvcmFnZW1nbXQub29v Oct 11 04:02:48 localhost certmonger[39573]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAENUsI2EC+Y0TfWgDvwuyVHKiA6MmcY9 Oct 11 04:02:48 localhost certmonger[39573]: UwIwwurCcBmo2vL5bsn7r9hKAG80Fhcv4oSHjymBOtJBSh33YBZCxppHGaei3b8+ Oct 11 04:02:48 localhost certmonger[39573]: Wb2XC/md6R9/grt+FHx8qCLlSKLHALbpm0w8EF9PLL04wbqSKI4xoEAlUJmjK0q5 Oct 11 04:02:48 localhost certmonger[39573]: C/Ya9RPyiBaOeIxUXfTNYwFUhXOWGooDnQ5Rm3hHyTCom5lCDKy+QIdrGbYEJhUs Oct 11 04:02:48 localhost certmonger[39573]: iYQx9nS4etoUtNPVVLqErOmPwEwR7khGJVu1eVz64vX8m37fLC3aqVNZBXpVueAG Oct 11 04:02:48 localhost certmonger[39573]: RmQ2bfeuAYmjHNF5ykcGYr0wdu2AI2SCFxNHUEuq1Nn/rvH0qSWMYsW46Jmp1QxP Oct 11 04:02:48 localhost certmonger[39573]: iRn0DGLxHsrhwmkdiD4B6l/pFa2OGBOxzQhsbiKyZf/d0AB0d+gVlVxz0b9vAFW1 Oct 11 04:02:48 localhost certmonger[39573]: ia2eAMnZRwauKBWL0VDxawtfKXzrwRRPNHAHY8KD5orEjIEFXJNZ4CDmpbfH1Rtl Oct 11 04:02:48 localhost certmonger[39573]: 8xY2yU4CdYhgglfWSSO9FqZV4MsxzE5i5g== Oct 11 04:02:48 localhost certmonger[39573]: -----END CERTIFICATE----- Oct 11 04:02:48 localhost certmonger[39573]: ". Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Certificate submission still ongoing. Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Certificate submission postprocessing complete. Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Child status = 0. Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Child output: Oct 11 04:02:48 localhost certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n8xY2yU4CdYhgglfWSSO9FqZV4MsxzE5i5g==\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 04:02:48 localhost certmonger[38891]: " Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 04:02:48 localhost certmonger[38891]: MIIFVTCCA72gAwIBAgIBFjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:48 localhost certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:48 localhost certmonger[38891]: MDI0N1oXDTI3MTAxMjA4MDI0N1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 04:02:48 localhost certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Oct 11 04:02:48 localhost certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBALlbHf0v2eGZRZ4nWpfK6xSJ4dCFzOrmZyuj Oct 11 04:02:48 localhost certmonger[38891]: e7VSe+zSeWZ5IbhQO1qa2GNwFps7F6g481YVKiBbTlbNl57xIH2Hxmwdqf5R+i42 Oct 11 04:02:48 localhost certmonger[38891]: 8dT2tiW1vJ91Q5SD+guC/hv1lZAcePuGqe5K78yF9iQ8IE0LiM3jmePmTGA/PaJf Oct 11 04:02:48 localhost certmonger[38891]: RYtLhViOCXcENFQt/QQeMk8VWl9SNUqtLQchKq+ytdIBwoqqHvv/2lLD6Y9ouTqR Oct 11 04:02:48 localhost certmonger[38891]: FmJ3eBeEBHGmAS5/vooXgjhqqJntJu8cmIXCHRNjg3LEmxftE88g4L2x3V+xiibg Oct 11 04:02:48 localhost certmonger[38891]: m3IYo1WqpevlrSfbUpl1nE3outWPnu7ASZZRJ+mhzaCThZUXtBcCAwEAAaOCAeYw Oct 11 04:02:48 localhost certmonger[38891]: ggHiMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 04:02:48 localhost certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 04:02:48 localhost certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 04:02:48 localhost certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 04:02:48 localhost certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 04:02:48 localhost certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLwT6kuHAxcMZ9ii++5tN6LX Oct 11 04:02:48 localhost certmonger[38891]: vuLdMIG/BgNVHREEgbcwgbSCIW5wMDAwNTQ4MTAxMi5zdG9yYWdlbWdtdC5vb28u Oct 11 04:02:48 localhost certmonger[38891]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NDgxMDEyLnN0b3JhZ2Vt Oct 11 04:02:48 localhost certmonger[38891]: Z210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Oct 11 04:02:48 localhost certmonger[38891]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU0ODEwMTIuc3RvcmFnZW1nbXQub29v Oct 11 04:02:48 localhost certmonger[38891]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAENUsI2EC+Y0TfWgDvwuyVHKiA6MmcY9 Oct 11 04:02:48 localhost certmonger[38891]: UwIwwurCcBmo2vL5bsn7r9hKAG80Fhcv4oSHjymBOtJBSh33YBZCxppHGaei3b8+ Oct 11 04:02:48 localhost certmonger[38891]: Wb2XC/md6R9/grt+FHx8qCLlSKLHALbpm0w8EF9PLL04wbqSKI4xoEAlUJmjK0q5 Oct 11 04:02:48 localhost certmonger[38891]: C/Ya9RPyiBaOeIxUXfTNYwFUhXOWGooDnQ5Rm3hHyTCom5lCDKy+QIdrGbYEJhUs Oct 11 04:02:48 localhost certmonger[38891]: iYQx9nS4etoUtNPVVLqErOmPwEwR7khGJVu1eVz64vX8m37fLC3aqVNZBXpVueAG Oct 11 04:02:48 localhost certmonger[38891]: RmQ2bfeuAYmjHNF5ykcGYr0wdu2AI2SCFxNHUEuq1Nn/rvH0qSWMYsW46Jmp1QxP Oct 11 04:02:48 localhost certmonger[38891]: iRn0DGLxHsrhwmkdiD4B6l/pFa2OGBOxzQhsbiKyZf/d0AB0d+gVlVxz0b9vAFW1 Oct 11 04:02:48 localhost certmonger[38891]: ia2eAMnZRwauKBWL0VDxawtfKXzrwRRPNHAHY8KD5orEjIEFXJNZ4CDmpbfH1Rtl Oct 11 04:02:48 localhost certmonger[38891]: 8xY2yU4CdYhgglfWSSO9FqZV4MsxzE5i5g== Oct 11 04:02:48 localhost certmonger[38891]: -----END CERTIFICATE----- Oct 11 04:02:48 localhost certmonger[38891]: ". Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] No hooks set for pre-save command. Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost certmonger[39581]: Certificate in file "/etc/pki/tls/certs/httpd-storage_mgmt.crt" issued by CA and saved. Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost sedispatch[727]: AVC Message regarding setroubleshoot, ignoring message Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost python3[39597]: ansible-certificate_request Invoked with name=httpd-internal_api dns=['np0005481012.internalapi.ooo.test'] principal=['HTTP/np0005481012.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-internal_api.crt /etc/pki/tls/certs/httpd/httpd-internal_api.crt#012cp /etc/pki/tls/private/httpd-internal_api.key /etc/pki/tls/private/httpd/httpd-internal_api.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:48 localhost certmonger[38891]: 2025-10-11 08:02:48 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:48 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost certmonger[39607]: 2025-10-11 08:02:49 [39607] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481012.internalapi.ooo.test" for child. Oct 11 04:02:49 localhost certmonger[39607]: 2025-10-11 08:02:49 [39607] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481012.internalapi.ooo.test Oct 11 04:02:49 localhost certmonger[39607]: " for child. Oct 11 04:02:49 localhost certmonger[39607]: 2025-10-11 08:02:49 [39607] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005481012.internalapi.ooo.test@OOO.TEST Oct 11 04:02:49 localhost certmonger[39607]: " for child. Oct 11 04:02:49 localhost certmonger[39607]: 2025-10-11 08:02:49 [39607] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 04:02:49 localhost certmonger[39607]: 2025-10-11 08:02:49 [39607] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 04:02:49 localhost certmonger[39607]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDEyLmludGVybmFsYXBp Oct 11 04:02:49 localhost certmonger[39607]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5JUv5GGH Oct 11 04:02:49 localhost certmonger[39607]: 5Rlh78o8WihMLdVbGVPtKcGk41Q8QGAm2Ck5SdWxD0wgbaG/OBonRGpuGAQvPcNZ Oct 11 04:02:49 localhost certmonger[39607]: zJBszDn6jyiluXx7FF+jzKMihOxC42CldnYZsqOW84bz5vJCdTJDvzk6Hp7tieuo Oct 11 04:02:49 localhost certmonger[39607]: Wbu7HL4KUXrNhMAG+JHc19/Fd+CQJMnOjpdajGaQ3muLNKWDFtQPmkR9zWNQkclg Oct 11 04:02:49 localhost certmonger[39607]: RC3i+gyarxo10rag2kE7PIsXGdPq3FbdB/sgcVuK6M85vhhHTFcgwCXAvRTdwBly Oct 11 04:02:49 localhost certmonger[39607]: g/CwEw+rL1pGg8QcHJhEsp19DQcPEVoV/fj8X52lZuYFQaoNS8HlwLLk4cZFH6cZ Oct 11 04:02:49 localhost certmonger[39607]: z7VKhPZ145IbBwIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 04:02:49 localhost certmonger[39607]: ADEAMQAwADgAMAAyADQAODCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Oct 11 04:02:49 localhost certmonger[39607]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29v Oct 11 04:02:49 localhost certmonger[39607]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTQ4MTAxMi5pbnRlcm5h Oct 11 04:02:49 localhost certmonger[39607]: bGFwaS5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Oct 11 04:02:49 localhost certmonger[39607]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9v Oct 11 04:02:49 localhost certmonger[39607]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Oct 11 04:02:49 localhost certmonger[39607]: AjAAMB0GA1UdDgQWBBT5wmo7z2PiwXyMkWEKUik2bXFEvjANBgkqhkiG9w0BAQsF Oct 11 04:02:49 localhost certmonger[39607]: AAOCAQEA2HFpsUOM5zpv30jVduDbGkW1+5m2PxXc2K9Dlknrg1aKXEsKPEhf2+PS Oct 11 04:02:49 localhost certmonger[39607]: oke8NiokkF7zns5lNq3Q+EqLtYXs2dCnWkaxFClwBd6nKN+CwO+KPykZtPQZyXvn Oct 11 04:02:49 localhost certmonger[39607]: 6GqBXa5Py5ZQyZBLQ/SQZ+RrM9KaBzKyJIKvOUfNZ2bbTSKKcSIio4rTAc3J/g6x Oct 11 04:02:49 localhost certmonger[39607]: kSay2gZTWthSxFUvfKDgwmfJ/idOvRsm9rKGTMB9WKY9lcbYref1KINAM/nJseFr Oct 11 04:02:49 localhost certmonger[39607]: LVYEZPfRXVzDhwuqZRupADz7+UI9UHleydb5fCtGNsNOGx+MZmDN8oyxFlOKONSC Oct 11 04:02:49 localhost certmonger[39607]: T/TOHyHEKto4q6wGAvU+7vzXAJERQg== Oct 11 04:02:49 localhost certmonger[39607]: -----END CERTIFICATE REQUEST----- Oct 11 04:02:49 localhost certmonger[39607]: " for child. Oct 11 04:02:49 localhost certmonger[39607]: 2025-10-11 08:02:49 [39607] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 04:02:49 localhost certmonger[39607]: 2025-10-11 08:02:49 [39607] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5JUv5GGH5Rlh78o8WihMLdVbGVPtKcGk41Q8QGAm2Ck5SdWxD0wgbaG/OBonRGpuGAQvPcNZzJBszDn6jyiluXx7FF+jzKMihOxC42CldnYZsqOW84bz5vJCdTJDvzk6Hp7tieuoWbu7HL4KUXrNhMAG+JHc19/Fd+CQJMnOjpdajGaQ3muLNKWDFtQPmkR9zWNQkclgRC3i+gyarxo10rag2kE7PIsXGdPq3FbdB/sgcVuK6M85vhhHTFcgwCXAvRTdwBlyg/CwEw+rL1pGg8QcHJhEsp19DQcPEVoV/fj8X52lZuYFQaoNS8HlwLLk4cZFH6cZz7VKhPZ145IbBwIDAQAB" for child. Oct 11 04:02:49 localhost certmonger[39607]: 2025-10-11 08:02:49 [39607] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 04:02:49 localhost certmonger[39607]: 2025-10-11 08:02:49 [39607] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 04:02:49 localhost certmonger[39607]: 2025-10-11 08:02:49 [39607] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 04:02:49 localhost certmonger[39607]: 2025-10-11 08:02:49 [39607] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:49 localhost certmonger[39607]: 2025-10-11 08:02:49 [39607] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost certmonger[39607]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost certmonger[39607]: Certificate: "MIIFVTCCA72gAwIBAgIBGTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4MDI0OVoXDTI3MTAxMjA4MDI0OVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOSVL+Rhh+UZYe/KPFooTC3VWxlT7SnBpONUPEBgJtgpOUnVsQ9MIG2hvzgaJ0RqbhgELz3DWcyQbMw5+o8opbl8exRfo8yjIoTsQuNgpXZ2GbKjlvOG8+byQnUyQ785Oh6e7YnrqFm7uxy+ClF6zYTABviR3NffxXfgkCTJzo6XWoxmkN5rizSlgxbUD5pEfc1jUJHJYEQt4voMmq8aNdK2oNpBOzyLFxnT6txW3Qf7IHFbiujPOb4YR0xXIMAlwL0U3cAZcoPwsBMPqy9aRoPEHByYRLKdfQ0HDxFaFf34/F+dpWbmBUGqDUvB5cCy5OHGRR+nGc+1SoT2deOSGwcCAwEAAaOCAeYwggHiMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFKjJNOCMtqT2W60HBkGz49jeaOHiMIG/BgNVHREEgbcwgbSCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1ShNDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAH3UpgzR7x+4GBSL3CtDGEWU8rnmI0bhD4lsLc1zNxaIWSIwD4/akaGY5TYg3cUvACaSP454/H9QlTuI55VDkVNylsUuthi6IhEuvE4LYUjnWgZtR7IOiXCA8IEKIz1Bu1lgYQ1uXLI3B9xR5nRgKWu7PRTYTF1mNwTMAQTTvfFWv/ELoWTlxZIBk5SNwozInQ9/0BTGtJMknEtLnsuxSm9ylYuWxYVhOpyPEZmPEiztCQ0OWTppI2etQwXCP1/wRGUdLZYsiqBxs/xzVm/kCW87E6aTkcbjqo/U6FLDhLNhY6mXkAwVg9/d3/gnEGmwqXUffL+DH++zpD0ZK5IQbU66v7eLOKSYL3yb/ZQuQn4PNgu8WsGfDbtpRtPFi+aoOvIwVHmsE2tFktoq+mGkCI3yvZ/4z7YmVQV0ifS97kRnC7oOCR0MvoKoEiclVJGQn0cTKkBnFJ3htCJQan6x6/N6Jioij/9KnCScFPWqrGzO1kw+UsA/cDp+EuIJ74c7Xg==" Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Certificate submission still ongoing. Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Certificate submission attempt complete. Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Child status = 0. Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Child output: Oct 11 04:02:49 localhost certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 04:02:49 localhost certmonger[38891]: MIIFVTCCA72gAwIBAgIBGTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:49 localhost certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:49 localhost certmonger[38891]: MDI0OVoXDTI3MTAxMjA4MDI0OVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 04:02:49 localhost certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 04:02:49 localhost certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAOSVL+Rhh+UZYe/KPFooTC3VWxlT7SnBpONU Oct 11 04:02:49 localhost certmonger[38891]: PEBgJtgpOUnVsQ9MIG2hvzgaJ0RqbhgELz3DWcyQbMw5+o8opbl8exRfo8yjIoTs Oct 11 04:02:49 localhost certmonger[38891]: QuNgpXZ2GbKjlvOG8+byQnUyQ785Oh6e7YnrqFm7uxy+ClF6zYTABviR3NffxXfg Oct 11 04:02:49 localhost certmonger[38891]: kCTJzo6XWoxmkN5rizSlgxbUD5pEfc1jUJHJYEQt4voMmq8aNdK2oNpBOzyLFxnT Oct 11 04:02:49 localhost certmonger[38891]: 6txW3Qf7IHFbiujPOb4YR0xXIMAlwL0U3cAZcoPwsBMPqy9aRoPEHByYRLKdfQ0H Oct 11 04:02:49 localhost certmonger[38891]: DxFaFf34/F+dpWbmBUGqDUvB5cCy5OHGRR+nGc+1SoT2deOSGwcCAwEAAaOCAeYw Oct 11 04:02:49 localhost certmonger[38891]: ggHiMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 04:02:49 localhost certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 04:02:49 localhost certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 04:02:49 localhost certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 04:02:49 localhost certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 04:02:49 localhost certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFKjJNOCMtqT2W60HBkGz49je Oct 11 04:02:49 localhost certmonger[38891]: aOHiMIG/BgNVHREEgbcwgbSCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 04:02:49 localhost certmonger[38891]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NDgxMDEyLmludGVybmFs Oct 11 04:02:49 localhost certmonger[38891]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Oct 11 04:02:49 localhost certmonger[38891]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29v Oct 11 04:02:49 localhost certmonger[38891]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAH3UpgzR7x+4GBSL3CtDGEWU8rnmI0bh Oct 11 04:02:49 localhost certmonger[38891]: D4lsLc1zNxaIWSIwD4/akaGY5TYg3cUvACaSP454/H9QlTuI55VDkVNylsUuthi6 Oct 11 04:02:49 localhost certmonger[38891]: IhEuvE4LYUjnWgZtR7IOiXCA8IEKIz1Bu1lgYQ1uXLI3B9xR5nRgKWu7PRTYTF1m Oct 11 04:02:49 localhost certmonger[38891]: NwTMAQTTvfFWv/ELoWTlxZIBk5SNwozInQ9/0BTGtJMknEtLnsuxSm9ylYuWxYVh Oct 11 04:02:49 localhost certmonger[38891]: OpyPEZmPEiztCQ0OWTppI2etQwXCP1/wRGUdLZYsiqBxs/xzVm/kCW87E6aTkcbj Oct 11 04:02:49 localhost certmonger[38891]: qo/U6FLDhLNhY6mXkAwVg9/d3/gnEGmwqXUffL+DH++zpD0ZK5IQbU66v7eLOKSY Oct 11 04:02:49 localhost certmonger[38891]: L3yb/ZQuQn4PNgu8WsGfDbtpRtPFi+aoOvIwVHmsE2tFktoq+mGkCI3yvZ/4z7Ym Oct 11 04:02:49 localhost certmonger[38891]: VQV0ifS97kRnC7oOCR0MvoKoEiclVJGQn0cTKkBnFJ3htCJQan6x6/N6Jioij/9K Oct 11 04:02:49 localhost certmonger[38891]: nCScFPWqrGzO1kw+UsA/cDp+EuIJ74c7Xg== Oct 11 04:02:49 localhost certmonger[38891]: -----END CERTIFICATE----- Oct 11 04:02:49 localhost certmonger[38891]: " Oct 11 04:02:49 localhost certmonger[39609]: 2025-10-11 08:02:49 [39609] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 04:02:49 localhost certmonger[39609]: MIIFVTCCA72gAwIBAgIBGTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:49 localhost certmonger[39609]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:49 localhost certmonger[39609]: MDI0OVoXDTI3MTAxMjA4MDI0OVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 04:02:49 localhost certmonger[39609]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 04:02:49 localhost certmonger[39609]: hvcNAQEBBQADggEPADCCAQoCggEBAOSVL+Rhh+UZYe/KPFooTC3VWxlT7SnBpONU Oct 11 04:02:49 localhost certmonger[39609]: PEBgJtgpOUnVsQ9MIG2hvzgaJ0RqbhgELz3DWcyQbMw5+o8opbl8exRfo8yjIoTs Oct 11 04:02:49 localhost certmonger[39609]: QuNgpXZ2GbKjlvOG8+byQnUyQ785Oh6e7YnrqFm7uxy+ClF6zYTABviR3NffxXfg Oct 11 04:02:49 localhost certmonger[39609]: kCTJzo6XWoxmkN5rizSlgxbUD5pEfc1jUJHJYEQt4voMmq8aNdK2oNpBOzyLFxnT Oct 11 04:02:49 localhost certmonger[39609]: 6txW3Qf7IHFbiujPOb4YR0xXIMAlwL0U3cAZcoPwsBMPqy9aRoPEHByYRLKdfQ0H Oct 11 04:02:49 localhost certmonger[39609]: DxFaFf34/F+dpWbmBUGqDUvB5cCy5OHGRR+nGc+1SoT2deOSGwcCAwEAAaOCAeYw Oct 11 04:02:49 localhost certmonger[39609]: ggHiMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 04:02:49 localhost certmonger[39609]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 04:02:49 localhost certmonger[39609]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 04:02:49 localhost certmonger[39609]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 04:02:49 localhost certmonger[39609]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 04:02:49 localhost certmonger[39609]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFKjJNOCMtqT2W60HBkGz49je Oct 11 04:02:49 localhost certmonger[39609]: aOHiMIG/BgNVHREEgbcwgbSCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 04:02:49 localhost certmonger[39609]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NDgxMDEyLmludGVybmFs Oct 11 04:02:49 localhost certmonger[39609]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Oct 11 04:02:49 localhost certmonger[39609]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29v Oct 11 04:02:49 localhost certmonger[39609]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAH3UpgzR7x+4GBSL3CtDGEWU8rnmI0bh Oct 11 04:02:49 localhost certmonger[39609]: D4lsLc1zNxaIWSIwD4/akaGY5TYg3cUvACaSP454/H9QlTuI55VDkVNylsUuthi6 Oct 11 04:02:49 localhost certmonger[39609]: IhEuvE4LYUjnWgZtR7IOiXCA8IEKIz1Bu1lgYQ1uXLI3B9xR5nRgKWu7PRTYTF1m Oct 11 04:02:49 localhost certmonger[39609]: NwTMAQTTvfFWv/ELoWTlxZIBk5SNwozInQ9/0BTGtJMknEtLnsuxSm9ylYuWxYVh Oct 11 04:02:49 localhost certmonger[39609]: OpyPEZmPEiztCQ0OWTppI2etQwXCP1/wRGUdLZYsiqBxs/xzVm/kCW87E6aTkcbj Oct 11 04:02:49 localhost certmonger[39609]: qo/U6FLDhLNhY6mXkAwVg9/d3/gnEGmwqXUffL+DH++zpD0ZK5IQbU66v7eLOKSY Oct 11 04:02:49 localhost certmonger[39609]: L3yb/ZQuQn4PNgu8WsGfDbtpRtPFi+aoOvIwVHmsE2tFktoq+mGkCI3yvZ/4z7Ym Oct 11 04:02:49 localhost certmonger[39609]: VQV0ifS97kRnC7oOCR0MvoKoEiclVJGQn0cTKkBnFJ3htCJQan6x6/N6Jioij/9K Oct 11 04:02:49 localhost certmonger[39609]: nCScFPWqrGzO1kw+UsA/cDp+EuIJ74c7Xg== Oct 11 04:02:49 localhost certmonger[39609]: -----END CERTIFICATE----- Oct 11 04:02:49 localhost certmonger[39609]: ". Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Certificate submission still ongoing. Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Certificate submission postprocessing complete. Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Child status = 0. Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Child output: Oct 11 04:02:49 localhost certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFVTCCA72gAwIBAgIBGTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u\nVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4\nMDI0OVoXDTI3MTAxMjA4MDI0OVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV\nBAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI\nhvcNAQEBBQADggEPADCCAQoCggEBAOSVL+Rhh+UZYe/KPFooTC3VWxlT7SnBpONU\nPEBgJtgpOUnVsQ9MIG2hvzgaJ0RqbhgELz3DWcyQbMw5+o8opbl8exRfo8yjIoTs\nQuNgpXZ2GbKjlvOG8+byQnUyQ785Oh6e7YnrqFm7uxy+ClF6zYTABviR3NffxXfg\nkCTJzo6XWoxmkN5rizSlgxbUD5pEfc1jUJHJYEQt4voMmq8aNdK2oNpBOzyLFxnT\n6txW3Qf7IHFbiujPOb4YR0xXIMAlwL0U3cAZcoPwsBMPqy9aRoPEHByYRLKdfQ0H\nDxFaFf34/F+dpWbmBUGqDUvB5cCy5OHGRR+nGc+1SoT2deOSGwcCAwEAAaOCAeYw\nggHiMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB\nBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw\nMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw\ncwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js\nL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD\nZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFKjJNOCMtqT2W60HBkGz49je\naOHiMIG/BgNVHREEgbcwgbSCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u\ndGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NDgxMDEyLmludGVybmFs\nYXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh\nNDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29v\nLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAH3UpgzR7x+4GBSL3CtDGEWU8rnmI0bh\nD4lsLc1zNxaIWSIwD4/akaGY5TYg3cUvACaSP454/H9QlTuI55VDkVNylsUuthi6\nIhEuvE4LYUjnWgZtR7IOiXCA8IEKIz1Bu1lgYQ1uXLI3B9xR5nRgKWu7PRTYTF1m\nNwTMAQTTvfFWv/ELoWTlxZIBk5SNwozInQ9/0BTGtJMknEtLnsuxSm9ylYuWxYVh\nOpyPEZmPEiztCQ0OWTppI2etQwXCP1/wRGUdLZYsiqBxs/xzVm/kCW87E6aTkcbj\nqo/U6FLDhLNhY6mXkAwVg9/d3/gnEGmwqXUffL+DH++zpD0ZK5IQbU66v7eLOKSY\nL3yb/ZQuQn4PNgu8WsGfDbtpRtPFi+aoOvIwVHmsE2tFktoq+mGkCI3yvZ/4z7Ym\nVQV0ifS97kRnC7oOCR0MvoKoEiclVJGQn0cTKkBnFJ3htCJQan6x6/N6Jioij/9K\nnCScFPWqrGzO1kw+UsA/cDp+EuIJ74c7Xg==\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 04:02:49 localhost certmonger[38891]: " Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 04:02:49 localhost certmonger[38891]: MIIFVTCCA72gAwIBAgIBGTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:49 localhost certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:49 localhost certmonger[38891]: MDI0OVoXDTI3MTAxMjA4MDI0OVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 04:02:49 localhost certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 04:02:49 localhost certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAOSVL+Rhh+UZYe/KPFooTC3VWxlT7SnBpONU Oct 11 04:02:49 localhost certmonger[38891]: PEBgJtgpOUnVsQ9MIG2hvzgaJ0RqbhgELz3DWcyQbMw5+o8opbl8exRfo8yjIoTs Oct 11 04:02:49 localhost certmonger[38891]: QuNgpXZ2GbKjlvOG8+byQnUyQ785Oh6e7YnrqFm7uxy+ClF6zYTABviR3NffxXfg Oct 11 04:02:49 localhost certmonger[38891]: kCTJzo6XWoxmkN5rizSlgxbUD5pEfc1jUJHJYEQt4voMmq8aNdK2oNpBOzyLFxnT Oct 11 04:02:49 localhost certmonger[38891]: 6txW3Qf7IHFbiujPOb4YR0xXIMAlwL0U3cAZcoPwsBMPqy9aRoPEHByYRLKdfQ0H Oct 11 04:02:49 localhost certmonger[38891]: DxFaFf34/F+dpWbmBUGqDUvB5cCy5OHGRR+nGc+1SoT2deOSGwcCAwEAAaOCAeYw Oct 11 04:02:49 localhost certmonger[38891]: ggHiMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 04:02:49 localhost certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 04:02:49 localhost certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 04:02:49 localhost certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 04:02:49 localhost certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 04:02:49 localhost certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFKjJNOCMtqT2W60HBkGz49je Oct 11 04:02:49 localhost certmonger[38891]: aOHiMIG/BgNVHREEgbcwgbSCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 04:02:49 localhost certmonger[38891]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NDgxMDEyLmludGVybmFs Oct 11 04:02:49 localhost certmonger[38891]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Oct 11 04:02:49 localhost certmonger[38891]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29v Oct 11 04:02:49 localhost certmonger[38891]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAH3UpgzR7x+4GBSL3CtDGEWU8rnmI0bh Oct 11 04:02:49 localhost certmonger[38891]: D4lsLc1zNxaIWSIwD4/akaGY5TYg3cUvACaSP454/H9QlTuI55VDkVNylsUuthi6 Oct 11 04:02:49 localhost certmonger[38891]: IhEuvE4LYUjnWgZtR7IOiXCA8IEKIz1Bu1lgYQ1uXLI3B9xR5nRgKWu7PRTYTF1m Oct 11 04:02:49 localhost certmonger[38891]: NwTMAQTTvfFWv/ELoWTlxZIBk5SNwozInQ9/0BTGtJMknEtLnsuxSm9ylYuWxYVh Oct 11 04:02:49 localhost certmonger[38891]: OpyPEZmPEiztCQ0OWTppI2etQwXCP1/wRGUdLZYsiqBxs/xzVm/kCW87E6aTkcbj Oct 11 04:02:49 localhost certmonger[38891]: qo/U6FLDhLNhY6mXkAwVg9/d3/gnEGmwqXUffL+DH++zpD0ZK5IQbU66v7eLOKSY Oct 11 04:02:49 localhost certmonger[38891]: L3yb/ZQuQn4PNgu8WsGfDbtpRtPFi+aoOvIwVHmsE2tFktoq+mGkCI3yvZ/4z7Ym Oct 11 04:02:49 localhost certmonger[38891]: VQV0ifS97kRnC7oOCR0MvoKoEiclVJGQn0cTKkBnFJ3htCJQan6x6/N6Jioij/9K Oct 11 04:02:49 localhost certmonger[38891]: nCScFPWqrGzO1kw+UsA/cDp+EuIJ74c7Xg== Oct 11 04:02:49 localhost certmonger[38891]: -----END CERTIFICATE----- Oct 11 04:02:49 localhost certmonger[38891]: ". Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] No hooks set for pre-save command. Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost certmonger[39617]: Certificate in file "/etc/pki/tls/certs/httpd-internal_api.crt" issued by CA and saved. Oct 11 04:02:49 localhost certmonger[38891]: 2025-10-11 08:02:49 [38891] Wrote to /var/lib/certmonger/requests/20251011080248 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost python3[39633]: ansible-certificate_request Invoked with name=httpd-external dns=['np0005481012.external.ooo.test'] principal=['HTTP/np0005481012.external.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-external.crt /etc/pki/tls/certs/httpd/httpd-external.crt#012cp /etc/pki/tls/private/httpd-external.key /etc/pki/tls/private/httpd/httpd-external.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost certmonger[38891]: 2025-10-11 08:02:50 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:50 localhost certmonger[38891]: 2025-10-11 08:02:50 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:50 localhost certmonger[38891]: 2025-10-11 08:02:50 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:50 localhost certmonger[38891]: 2025-10-11 08:02:50 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:50 localhost certmonger[38891]: 2025-10-11 08:02:50 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:50 localhost certmonger[38891]: 2025-10-11 08:02:50 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:50 localhost certmonger[38891]: 2025-10-11 08:02:50 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:50 localhost certmonger[38891]: 2025-10-11 08:02:50 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:50 localhost certmonger[38891]: 2025-10-11 08:02:50 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost sedispatch[727]: AVC Message regarding setroubleshoot, ignoring message Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l bcb6613b-f6c2-4978-8aee-ecb1b8721916 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1c16211-7c13-43a7-ab8f-7051e74423ca Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost certmonger[38891]: 2025-10-11 08:02:50 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:50 localhost certmonger[38891]: 2025-10-11 08:02:50 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:50 localhost certmonger[38891]: 2025-10-11 08:02:50 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:50 localhost certmonger[38891]: 2025-10-11 08:02:50 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:50 localhost certmonger[38891]: 2025-10-11 08:02:50 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:50 localhost certmonger[38891]: 2025-10-11 08:02:50 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost certmonger[38891]: 2025-10-11 08:02:50 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost certmonger[38891]: 2025-10-11 08:02:50 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:50 localhost certmonger[39643]: 2025-10-11 08:02:50 [39643] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481012.external.ooo.test" for child. Oct 11 04:02:50 localhost certmonger[39643]: 2025-10-11 08:02:50 [39643] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481012.external.ooo.test Oct 11 04:02:50 localhost certmonger[39643]: " for child. Oct 11 04:02:50 localhost certmonger[39643]: 2025-10-11 08:02:50 [39643] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005481012.external.ooo.test@OOO.TEST Oct 11 04:02:50 localhost certmonger[39643]: " for child. Oct 11 04:02:50 localhost certmonger[39643]: 2025-10-11 08:02:50 [39643] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 04:02:50 localhost certmonger[39643]: 2025-10-11 08:02:50 [39643] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 04:02:50 localhost certmonger[39643]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NDgxMDEyLmV4dGVybmFsLm9v Oct 11 04:02:50 localhost certmonger[39643]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyxBh5nVlqKQg Oct 11 04:02:50 localhost certmonger[39643]: KukaIUxoWe8kd2jseezxj76x25HCPlpPFbSdS78jmdowdfozUJRL8UVUdogx/X/m Oct 11 04:02:50 localhost certmonger[39643]: a3LhBtGUY32E7UIL1Qfo1yxKVrptz1HhxHbS0bpbue8+aU+vn85s7cH9sNa4kEx2 Oct 11 04:02:50 localhost certmonger[39643]: 3iCFaK/6dVeoeItU/ypk8Q42aEuDFJ26uQfDUWue0YygOFIWHO+YjxFzr/1R/4Dw Oct 11 04:02:50 localhost certmonger[39643]: vea47g4ylCCVz0B63Iu6h3W4Xlr8KOZGnA70gW/iQReKUL1+OBPITxvxJlz0wzF4 Oct 11 04:02:50 localhost certmonger[39643]: JSSG0AvsuuOqq4cA+aGR5PiWnfX2uMWlP458oqB86IVa9yK9QTEDRwE4Eno4UUuo Oct 11 04:02:50 localhost certmonger[39643]: PAydB7va7wIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAwADEA Oct 11 04:02:50 localhost certmonger[39643]: MQAwADgAMAAyADUAMDCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Oct 11 04:02:50 localhost certmonger[39643]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU0ODEwMTIuZXh0ZXJuYWwub29vLnRlc3Sg Oct 11 04:02:50 localhost certmonger[39643]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTQ4MTAxMi5leHRlcm5hbC5vb28u Oct 11 04:02:50 localhost certmonger[39643]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Oct 11 04:02:50 localhost certmonger[39643]: oSgwJhsESFRUUBsebnAwMDA1NDgxMDEyLmV4dGVybmFsLm9vby50ZXN0MB0GA1Ud Oct 11 04:02:50 localhost certmonger[39643]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Oct 11 04:02:50 localhost certmonger[39643]: BBQcfefI6BBSzIdQuHy7E59nnmE6FTANBgkqhkiG9w0BAQsFAAOCAQEAw1IiesbW Oct 11 04:02:50 localhost certmonger[39643]: 3pbXwM7bIO6amIHY5FlNmQzH+ibHL29lBDhdkQaeODar2HnEG4k1wVAP4BE49Juv Oct 11 04:02:50 localhost certmonger[39643]: xh7CCMj50D9Eux+CJBZgHBiAoQmx/M0wmAEzm36ParkQaTiMon2TyYVl/mqA7IjU Oct 11 04:02:50 localhost certmonger[39643]: 6oijET9q8ryiD9z6FcjhrOAvZtMteBXUiHceqPH6NqM5W1uac8srMOo93Sa97zh0 Oct 11 04:02:50 localhost certmonger[39643]: XBG+2MMLmGV04zWURV9EcWwJqYBGn/c5U5Vph8v79yMJUaUf97adakEREJfeL0aS Oct 11 04:02:50 localhost certmonger[39643]: 7ujTwSWIHduQFil2yDC1+4v+bGYvuGjJHsVg77/0aTz3ElAajhjVrx4gGescPxkE Oct 11 04:02:50 localhost certmonger[39643]: +X4TJCthH6qxzA== Oct 11 04:02:50 localhost certmonger[39643]: -----END CERTIFICATE REQUEST----- Oct 11 04:02:50 localhost certmonger[39643]: " for child. Oct 11 04:02:50 localhost certmonger[39643]: 2025-10-11 08:02:50 [39643] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 04:02:50 localhost certmonger[39643]: 2025-10-11 08:02:50 [39643] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyxBh5nVlqKQgKukaIUxoWe8kd2jseezxj76x25HCPlpPFbSdS78jmdowdfozUJRL8UVUdogx/X/ma3LhBtGUY32E7UIL1Qfo1yxKVrptz1HhxHbS0bpbue8+aU+vn85s7cH9sNa4kEx23iCFaK/6dVeoeItU/ypk8Q42aEuDFJ26uQfDUWue0YygOFIWHO+YjxFzr/1R/4Dwvea47g4ylCCVz0B63Iu6h3W4Xlr8KOZGnA70gW/iQReKUL1+OBPITxvxJlz0wzF4JSSG0AvsuuOqq4cA+aGR5PiWnfX2uMWlP458oqB86IVa9yK9QTEDRwE4Eno4UUuoPAydB7va7wIDAQAB" for child. Oct 11 04:02:50 localhost certmonger[39643]: 2025-10-11 08:02:50 [39643] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 04:02:50 localhost certmonger[39643]: 2025-10-11 08:02:50 [39643] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 04:02:50 localhost certmonger[39643]: 2025-10-11 08:02:50 [39643] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 04:02:50 localhost certmonger[39643]: 2025-10-11 08:02:50 [39643] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:50 localhost certmonger[39643]: 2025-10-11 08:02:50 [39643] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:50 localhost certmonger[38891]: 2025-10-11 08:02:50 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:50 localhost certmonger[39643]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:50 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b102c22-c66d-46cb-9eae-b992af9785a2 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0f5c2ee3-2c69-49cf-bd2d-28d718dec5fc Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0f5c2ee3-2c69-49cf-bd2d-28d718dec5fc Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23b1f018-2e62-481d-ad08-7147fc9c5e96 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23b1f018-2e62-481d-ad08-7147fc9c5e96 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost certmonger[39643]: Certificate: "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" Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Certificate submission still ongoing. Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Certificate submission attempt complete. Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Child status = 0. Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Child output: Oct 11 04:02:51 localhost certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 04:02:51 localhost certmonger[38891]: MIIFSTCCA7GgAwIBAgIBHDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:51 localhost certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:51 localhost certmonger[38891]: MDI1MVoXDTI3MTAxMjA4MDI1MVowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Oct 11 04:02:51 localhost certmonger[38891]: BAMMHm5wMDAwNTQ4MTAxMi5leHRlcm5hbC5vb28udGVzdDCCASIwDQYJKoZIhvcN Oct 11 04:02:51 localhost certmonger[38891]: AQEBBQADggEPADCCAQoCggEBAMsQYeZ1ZaikICrpGiFMaFnvJHdo7Hns8Y++sduR Oct 11 04:02:51 localhost certmonger[38891]: wj5aTxW0nUu/I5naMHX6M1CUS/FFVHaIMf1/5mty4QbRlGN9hO1CC9UH6NcsSla6 Oct 11 04:02:51 localhost certmonger[38891]: bc9R4cR20tG6W7nvPmlPr5/ObO3B/bDWuJBMdt4ghWiv+nVXqHiLVP8qZPEONmhL Oct 11 04:02:51 localhost certmonger[38891]: gxSdurkHw1FrntGMoDhSFhzvmI8Rc6/9Uf+A8L3muO4OMpQglc9AetyLuod1uF5a Oct 11 04:02:51 localhost certmonger[38891]: /CjmRpwO9IFv4kEXilC9fjgTyE8b8SZc9MMxeCUkhtAL7LrjqquHAPmhkeT4lp31 Oct 11 04:02:51 localhost certmonger[38891]: 9rjFpT+OfKKgfOiFWvcivUExA0cBOBJ6OFFLqDwMnQe72u8CAwEAAaOCAd0wggHZ Oct 11 04:02:51 localhost certmonger[38891]: MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4w Oct 11 04:02:51 localhost certmonger[38891]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Oct 11 04:02:51 localhost certmonger[38891]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Oct 11 04:02:51 localhost certmonger[38891]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Oct 11 04:02:51 localhost certmonger[38891]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Oct 11 04:02:51 localhost certmonger[38891]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLHux5Hik7AQg5Y1YQoG5zE4/C05 Oct 11 04:02:51 localhost certmonger[38891]: MIG2BgNVHREEga4wgauCHm5wMDAwNTQ4MTAxMi5leHRlcm5hbC5vb28udGVzdKA8 Oct 11 04:02:51 localhost certmonger[38891]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NDgxMDEyLmV4dGVybmFsLm9vby50 Oct 11 04:02:51 localhost certmonger[38891]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Oct 11 04:02:51 localhost certmonger[38891]: KDAmGwRIVFRQGx5ucDAwMDU0ODEwMTIuZXh0ZXJuYWwub29vLnRlc3QwDQYJKoZI Oct 11 04:02:51 localhost certmonger[38891]: hvcNAQELBQADggGBACOktUqxAljApbeCXdRleaTp+GWZHYHaxZ8CsN0fC/SgZqHk Oct 11 04:02:51 localhost certmonger[38891]: 9kA+gmcqcswCHwfonaE1hlXmAHmiJ7aLXLu7Y+P9DqE16YeFA5JIbELZfQKrz1eb Oct 11 04:02:51 localhost certmonger[38891]: q8Z7it7EGLrmMVcqOYLIYl7qGIacfvkF/wjDFjx24PVcHhhcBrkBp69ehom6EC9l Oct 11 04:02:51 localhost certmonger[38891]: 072ZvvaK6CPGqg9jzL3YMDeoXUwryKwdeFQST46bHTzxNophNjIer3PJBvPCQJJ5 Oct 11 04:02:51 localhost certmonger[38891]: zWR6K2xpHju20ZjzFZRQ3cKRJIqW/Xq5xZRz8L/pvHi8tfWGmh1UY5ASfwMmkm9+ Oct 11 04:02:51 localhost certmonger[38891]: YYLgfsGoSlHDlxLxtzu9rxZTCRqw9c6r8kT3L/EQM5zKJlQtr77TpHuf/gE86hb9 Oct 11 04:02:51 localhost certmonger[38891]: CHJ4VdKFVx733QcHSIMhvGdX9qkZpPMzcxi98POngJF1+3hsHkrpWKQsaCcvuGPz Oct 11 04:02:51 localhost certmonger[38891]: MAEF9A3aDasiV1WZSOfb2UG2Y0V4nfe0MFv408QcwQ//snklRlJza97Q2LyDFJkE Oct 11 04:02:51 localhost certmonger[38891]: M3WscteoXQNeaLRf/w== Oct 11 04:02:51 localhost certmonger[38891]: -----END CERTIFICATE----- Oct 11 04:02:51 localhost certmonger[38891]: " Oct 11 04:02:51 localhost certmonger[39645]: 2025-10-11 08:02:51 [39645] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 04:02:51 localhost certmonger[39645]: MIIFSTCCA7GgAwIBAgIBHDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:51 localhost certmonger[39645]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:51 localhost certmonger[39645]: MDI1MVoXDTI3MTAxMjA4MDI1MVowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Oct 11 04:02:51 localhost certmonger[39645]: BAMMHm5wMDAwNTQ4MTAxMi5leHRlcm5hbC5vb28udGVzdDCCASIwDQYJKoZIhvcN Oct 11 04:02:51 localhost certmonger[39645]: AQEBBQADggEPADCCAQoCggEBAMsQYeZ1ZaikICrpGiFMaFnvJHdo7Hns8Y++sduR Oct 11 04:02:51 localhost certmonger[39645]: wj5aTxW0nUu/I5naMHX6M1CUS/FFVHaIMf1/5mty4QbRlGN9hO1CC9UH6NcsSla6 Oct 11 04:02:51 localhost certmonger[39645]: bc9R4cR20tG6W7nvPmlPr5/ObO3B/bDWuJBMdt4ghWiv+nVXqHiLVP8qZPEONmhL Oct 11 04:02:51 localhost certmonger[39645]: gxSdurkHw1FrntGMoDhSFhzvmI8Rc6/9Uf+A8L3muO4OMpQglc9AetyLuod1uF5a Oct 11 04:02:51 localhost certmonger[39645]: /CjmRpwO9IFv4kEXilC9fjgTyE8b8SZc9MMxeCUkhtAL7LrjqquHAPmhkeT4lp31 Oct 11 04:02:51 localhost certmonger[39645]: 9rjFpT+OfKKgfOiFWvcivUExA0cBOBJ6OFFLqDwMnQe72u8CAwEAAaOCAd0wggHZ Oct 11 04:02:51 localhost certmonger[39645]: MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4w Oct 11 04:02:51 localhost certmonger[39645]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Oct 11 04:02:51 localhost certmonger[39645]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Oct 11 04:02:51 localhost certmonger[39645]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Oct 11 04:02:51 localhost certmonger[39645]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Oct 11 04:02:51 localhost certmonger[39645]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLHux5Hik7AQg5Y1YQoG5zE4/C05 Oct 11 04:02:51 localhost certmonger[39645]: MIG2BgNVHREEga4wgauCHm5wMDAwNTQ4MTAxMi5leHRlcm5hbC5vb28udGVzdKA8 Oct 11 04:02:51 localhost certmonger[39645]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NDgxMDEyLmV4dGVybmFsLm9vby50 Oct 11 04:02:51 localhost certmonger[39645]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Oct 11 04:02:51 localhost certmonger[39645]: KDAmGwRIVFRQGx5ucDAwMDU0ODEwMTIuZXh0ZXJuYWwub29vLnRlc3QwDQYJKoZI Oct 11 04:02:51 localhost certmonger[39645]: hvcNAQELBQADggGBACOktUqxAljApbeCXdRleaTp+GWZHYHaxZ8CsN0fC/SgZqHk Oct 11 04:02:51 localhost certmonger[39645]: 9kA+gmcqcswCHwfonaE1hlXmAHmiJ7aLXLu7Y+P9DqE16YeFA5JIbELZfQKrz1eb Oct 11 04:02:51 localhost certmonger[39645]: q8Z7it7EGLrmMVcqOYLIYl7qGIacfvkF/wjDFjx24PVcHhhcBrkBp69ehom6EC9l Oct 11 04:02:51 localhost certmonger[39645]: 072ZvvaK6CPGqg9jzL3YMDeoXUwryKwdeFQST46bHTzxNophNjIer3PJBvPCQJJ5 Oct 11 04:02:51 localhost certmonger[39645]: zWR6K2xpHju20ZjzFZRQ3cKRJIqW/Xq5xZRz8L/pvHi8tfWGmh1UY5ASfwMmkm9+ Oct 11 04:02:51 localhost certmonger[39645]: YYLgfsGoSlHDlxLxtzu9rxZTCRqw9c6r8kT3L/EQM5zKJlQtr77TpHuf/gE86hb9 Oct 11 04:02:51 localhost certmonger[39645]: CHJ4VdKFVx733QcHSIMhvGdX9qkZpPMzcxi98POngJF1+3hsHkrpWKQsaCcvuGPz Oct 11 04:02:51 localhost certmonger[39645]: MAEF9A3aDasiV1WZSOfb2UG2Y0V4nfe0MFv408QcwQ//snklRlJza97Q2LyDFJkE Oct 11 04:02:51 localhost certmonger[39645]: M3WscteoXQNeaLRf/w== Oct 11 04:02:51 localhost certmonger[39645]: -----END CERTIFICATE----- Oct 11 04:02:51 localhost certmonger[39645]: ". Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Certificate submission still ongoing. Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Certificate submission postprocessing complete. Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Child status = 0. Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Child output: Oct 11 04:02:51 localhost certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nM3WscteoXQNeaLRf/w==\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 04:02:51 localhost certmonger[38891]: " Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 04:02:51 localhost certmonger[38891]: MIIFSTCCA7GgAwIBAgIBHDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:51 localhost certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:51 localhost certmonger[38891]: MDI1MVoXDTI3MTAxMjA4MDI1MVowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Oct 11 04:02:51 localhost certmonger[38891]: BAMMHm5wMDAwNTQ4MTAxMi5leHRlcm5hbC5vb28udGVzdDCCASIwDQYJKoZIhvcN Oct 11 04:02:51 localhost certmonger[38891]: AQEBBQADggEPADCCAQoCggEBAMsQYeZ1ZaikICrpGiFMaFnvJHdo7Hns8Y++sduR Oct 11 04:02:51 localhost certmonger[38891]: wj5aTxW0nUu/I5naMHX6M1CUS/FFVHaIMf1/5mty4QbRlGN9hO1CC9UH6NcsSla6 Oct 11 04:02:51 localhost certmonger[38891]: bc9R4cR20tG6W7nvPmlPr5/ObO3B/bDWuJBMdt4ghWiv+nVXqHiLVP8qZPEONmhL Oct 11 04:02:51 localhost certmonger[38891]: gxSdurkHw1FrntGMoDhSFhzvmI8Rc6/9Uf+A8L3muO4OMpQglc9AetyLuod1uF5a Oct 11 04:02:51 localhost certmonger[38891]: /CjmRpwO9IFv4kEXilC9fjgTyE8b8SZc9MMxeCUkhtAL7LrjqquHAPmhkeT4lp31 Oct 11 04:02:51 localhost certmonger[38891]: 9rjFpT+OfKKgfOiFWvcivUExA0cBOBJ6OFFLqDwMnQe72u8CAwEAAaOCAd0wggHZ Oct 11 04:02:51 localhost certmonger[38891]: MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4w Oct 11 04:02:51 localhost certmonger[38891]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Oct 11 04:02:51 localhost certmonger[38891]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Oct 11 04:02:51 localhost certmonger[38891]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Oct 11 04:02:51 localhost certmonger[38891]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Oct 11 04:02:51 localhost certmonger[38891]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLHux5Hik7AQg5Y1YQoG5zE4/C05 Oct 11 04:02:51 localhost certmonger[38891]: MIG2BgNVHREEga4wgauCHm5wMDAwNTQ4MTAxMi5leHRlcm5hbC5vb28udGVzdKA8 Oct 11 04:02:51 localhost certmonger[38891]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NDgxMDEyLmV4dGVybmFsLm9vby50 Oct 11 04:02:51 localhost certmonger[38891]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Oct 11 04:02:51 localhost certmonger[38891]: KDAmGwRIVFRQGx5ucDAwMDU0ODEwMTIuZXh0ZXJuYWwub29vLnRlc3QwDQYJKoZI Oct 11 04:02:51 localhost certmonger[38891]: hvcNAQELBQADggGBACOktUqxAljApbeCXdRleaTp+GWZHYHaxZ8CsN0fC/SgZqHk Oct 11 04:02:51 localhost certmonger[38891]: 9kA+gmcqcswCHwfonaE1hlXmAHmiJ7aLXLu7Y+P9DqE16YeFA5JIbELZfQKrz1eb Oct 11 04:02:51 localhost certmonger[38891]: q8Z7it7EGLrmMVcqOYLIYl7qGIacfvkF/wjDFjx24PVcHhhcBrkBp69ehom6EC9l Oct 11 04:02:51 localhost certmonger[38891]: 072ZvvaK6CPGqg9jzL3YMDeoXUwryKwdeFQST46bHTzxNophNjIer3PJBvPCQJJ5 Oct 11 04:02:51 localhost certmonger[38891]: zWR6K2xpHju20ZjzFZRQ3cKRJIqW/Xq5xZRz8L/pvHi8tfWGmh1UY5ASfwMmkm9+ Oct 11 04:02:51 localhost certmonger[38891]: YYLgfsGoSlHDlxLxtzu9rxZTCRqw9c6r8kT3L/EQM5zKJlQtr77TpHuf/gE86hb9 Oct 11 04:02:51 localhost certmonger[38891]: CHJ4VdKFVx733QcHSIMhvGdX9qkZpPMzcxi98POngJF1+3hsHkrpWKQsaCcvuGPz Oct 11 04:02:51 localhost certmonger[38891]: MAEF9A3aDasiV1WZSOfb2UG2Y0V4nfe0MFv408QcwQ//snklRlJza97Q2LyDFJkE Oct 11 04:02:51 localhost certmonger[38891]: M3WscteoXQNeaLRf/w== Oct 11 04:02:51 localhost certmonger[38891]: -----END CERTIFICATE----- Oct 11 04:02:51 localhost certmonger[38891]: ". Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] No hooks set for pre-save command. Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7951455f-87fd-46d3-a502-1d983cc2aabb Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l bcb6613b-f6c2-4978-8aee-ecb1b8721916 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:51 localhost certmonger[39653]: Certificate in file "/etc/pki/tls/certs/httpd-external.crt" issued by CA and saved. Oct 11 04:02:51 localhost certmonger[38891]: 2025-10-11 08:02:51 [38891] Wrote to /var/lib/certmonger/requests/20251011080250 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2db8a4a1-9b8d-4859-9a1c-1de1c699afe9 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2118b3ff-9e2a-4ca5-9fa3-1bd0d2c3a578 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1838e65a-539d-49ed-a2a0-b9f639841c04 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4f206943-d2f2-43d7-ac17-06e854f1b050 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79f22a35-67ba-43a9-b160-9d6e56831a6a Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79f22a35-67ba-43a9-b160-9d6e56831a6a Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9218e75e-3f88-496f-a0c8-6b4805ba4eb7 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2db8a4a1-9b8d-4859-9a1c-1de1c699afe9 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:51 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 09f346ed-57bc-4b5c-acbf-e144912fd68d Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:52 localhost python3[39669]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c7ab14fa-e62e-4228-8e7d-11c433be2ccb Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ebd04dbc-52d6-4037-aadc-4eb149427d9a Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ebd04dbc-52d6-4037-aadc-4eb149427d9a Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d91756c0-40fd-4bfa-8de8-2f42bfd6f2c0 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d91756c0-40fd-4bfa-8de8-2f42bfd6f2c0 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a3ad0af3-c618-42bf-9111-ae1005b75895 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a3ad0af3-c618-42bf-9111-ae1005b75895 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost sedispatch[727]: AVC Message regarding setroubleshoot, ignoring message Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:53 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6effa627-31f4-4a74-8789-3862a28fae79 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4bc823c6-9e2e-48ed-aa37-9af90e5e6e8a Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost sedispatch[727]: AVC Message regarding setroubleshoot, ignoring message Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 334e2484-6711-4e03-af87-f1326f4970c8 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a3ad0af3-c618-42bf-9111-ae1005b75895 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:54 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l bcb6613b-f6c2-4978-8aee-ecb1b8721916 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1c16211-7c13-43a7-ab8f-7051e74423ca Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b102c22-c66d-46cb-9eae-b992af9785a2 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0f5c2ee3-2c69-49cf-bd2d-28d718dec5fc Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0f5c2ee3-2c69-49cf-bd2d-28d718dec5fc Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23b1f018-2e62-481d-ad08-7147fc9c5e96 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23b1f018-2e62-481d-ad08-7147fc9c5e96 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7951455f-87fd-46d3-a502-1d983cc2aabb Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l bcb6613b-f6c2-4978-8aee-ecb1b8721916 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2db8a4a1-9b8d-4859-9a1c-1de1c699afe9 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2118b3ff-9e2a-4ca5-9fa3-1bd0d2c3a578 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1838e65a-539d-49ed-a2a0-b9f639841c04 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4f206943-d2f2-43d7-ac17-06e854f1b050 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79f22a35-67ba-43a9-b160-9d6e56831a6a Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79f22a35-67ba-43a9-b160-9d6e56831a6a Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9218e75e-3f88-496f-a0c8-6b4805ba4eb7 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2db8a4a1-9b8d-4859-9a1c-1de1c699afe9 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 09f346ed-57bc-4b5c-acbf-e144912fd68d Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c7ab14fa-e62e-4228-8e7d-11c433be2ccb Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ebd04dbc-52d6-4037-aadc-4eb149427d9a Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ebd04dbc-52d6-4037-aadc-4eb149427d9a Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d91756c0-40fd-4bfa-8de8-2f42bfd6f2c0 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d91756c0-40fd-4bfa-8de8-2f42bfd6f2c0 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a3ad0af3-c618-42bf-9111-ae1005b75895 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a3ad0af3-c618-42bf-9111-ae1005b75895 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6effa627-31f4-4a74-8789-3862a28fae79 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4bc823c6-9e2e-48ed-aa37-9af90e5e6e8a Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 334e2484-6711-4e03-af87-f1326f4970c8 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a3ad0af3-c618-42bf-9111-ae1005b75895 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5922c9f7-5141-4005-9210-10b6b09c1572 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l bcb6613b-f6c2-4978-8aee-ecb1b8721916 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1c16211-7c13-43a7-ab8f-7051e74423ca Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b102c22-c66d-46cb-9eae-b992af9785a2 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0f5c2ee3-2c69-49cf-bd2d-28d718dec5fc Oct 11 04:02:55 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0f5c2ee3-2c69-49cf-bd2d-28d718dec5fc Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23b1f018-2e62-481d-ad08-7147fc9c5e96 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23b1f018-2e62-481d-ad08-7147fc9c5e96 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7951455f-87fd-46d3-a502-1d983cc2aabb Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l bcb6613b-f6c2-4978-8aee-ecb1b8721916 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2db8a4a1-9b8d-4859-9a1c-1de1c699afe9 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2118b3ff-9e2a-4ca5-9fa3-1bd0d2c3a578 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1838e65a-539d-49ed-a2a0-b9f639841c04 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4f206943-d2f2-43d7-ac17-06e854f1b050 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79f22a35-67ba-43a9-b160-9d6e56831a6a Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79f22a35-67ba-43a9-b160-9d6e56831a6a Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9218e75e-3f88-496f-a0c8-6b4805ba4eb7 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2db8a4a1-9b8d-4859-9a1c-1de1c699afe9 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 09f346ed-57bc-4b5c-acbf-e144912fd68d Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c7ab14fa-e62e-4228-8e7d-11c433be2ccb Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ebd04dbc-52d6-4037-aadc-4eb149427d9a Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ebd04dbc-52d6-4037-aadc-4eb149427d9a Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d91756c0-40fd-4bfa-8de8-2f42bfd6f2c0 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d91756c0-40fd-4bfa-8de8-2f42bfd6f2c0 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a3ad0af3-c618-42bf-9111-ae1005b75895 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a3ad0af3-c618-42bf-9111-ae1005b75895 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost kernel: VFS: idmapped mount is not enabled. Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6effa627-31f4-4a74-8789-3862a28fae79 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4bc823c6-9e2e-48ed-aa37-9af90e5e6e8a Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 334e2484-6711-4e03-af87-f1326f4970c8 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a3ad0af3-c618-42bf-9111-ae1005b75895 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5922c9f7-5141-4005-9210-10b6b09c1572 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l bcb6613b-f6c2-4978-8aee-ecb1b8721916 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1c16211-7c13-43a7-ab8f-7051e74423ca Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b102c22-c66d-46cb-9eae-b992af9785a2 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0f5c2ee3-2c69-49cf-bd2d-28d718dec5fc Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0f5c2ee3-2c69-49cf-bd2d-28d718dec5fc Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23b1f018-2e62-481d-ad08-7147fc9c5e96 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23b1f018-2e62-481d-ad08-7147fc9c5e96 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7951455f-87fd-46d3-a502-1d983cc2aabb Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l bcb6613b-f6c2-4978-8aee-ecb1b8721916 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2db8a4a1-9b8d-4859-9a1c-1de1c699afe9 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2118b3ff-9e2a-4ca5-9fa3-1bd0d2c3a578 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1838e65a-539d-49ed-a2a0-b9f639841c04 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4f206943-d2f2-43d7-ac17-06e854f1b050 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79f22a35-67ba-43a9-b160-9d6e56831a6a Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79f22a35-67ba-43a9-b160-9d6e56831a6a Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9218e75e-3f88-496f-a0c8-6b4805ba4eb7 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2db8a4a1-9b8d-4859-9a1c-1de1c699afe9 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 09f346ed-57bc-4b5c-acbf-e144912fd68d Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c7ab14fa-e62e-4228-8e7d-11c433be2ccb Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ebd04dbc-52d6-4037-aadc-4eb149427d9a Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ebd04dbc-52d6-4037-aadc-4eb149427d9a Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d91756c0-40fd-4bfa-8de8-2f42bfd6f2c0 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d91756c0-40fd-4bfa-8de8-2f42bfd6f2c0 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a3ad0af3-c618-42bf-9111-ae1005b75895 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a3ad0af3-c618-42bf-9111-ae1005b75895 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6effa627-31f4-4a74-8789-3862a28fae79 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4bc823c6-9e2e-48ed-aa37-9af90e5e6e8a Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 334e2484-6711-4e03-af87-f1326f4970c8 Oct 11 04:02:56 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a3ad0af3-c618-42bf-9111-ae1005b75895 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5922c9f7-5141-4005-9210-10b6b09c1572 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l bcb6613b-f6c2-4978-8aee-ecb1b8721916 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1c16211-7c13-43a7-ab8f-7051e74423ca Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b102c22-c66d-46cb-9eae-b992af9785a2 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0f5c2ee3-2c69-49cf-bd2d-28d718dec5fc Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0f5c2ee3-2c69-49cf-bd2d-28d718dec5fc Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23b1f018-2e62-481d-ad08-7147fc9c5e96 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23b1f018-2e62-481d-ad08-7147fc9c5e96 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7951455f-87fd-46d3-a502-1d983cc2aabb Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l bcb6613b-f6c2-4978-8aee-ecb1b8721916 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2db8a4a1-9b8d-4859-9a1c-1de1c699afe9 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2118b3ff-9e2a-4ca5-9fa3-1bd0d2c3a578 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1838e65a-539d-49ed-a2a0-b9f639841c04 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4f206943-d2f2-43d7-ac17-06e854f1b050 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79f22a35-67ba-43a9-b160-9d6e56831a6a Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 79f22a35-67ba-43a9-b160-9d6e56831a6a Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9218e75e-3f88-496f-a0c8-6b4805ba4eb7 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2db8a4a1-9b8d-4859-9a1c-1de1c699afe9 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 09f346ed-57bc-4b5c-acbf-e144912fd68d Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c7ab14fa-e62e-4228-8e7d-11c433be2ccb Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ebd04dbc-52d6-4037-aadc-4eb149427d9a Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ebd04dbc-52d6-4037-aadc-4eb149427d9a Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d91756c0-40fd-4bfa-8de8-2f42bfd6f2c0 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d91756c0-40fd-4bfa-8de8-2f42bfd6f2c0 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a3ad0af3-c618-42bf-9111-ae1005b75895 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a3ad0af3-c618-42bf-9111-ae1005b75895 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6effa627-31f4-4a74-8789-3862a28fae79 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4bc823c6-9e2e-48ed-aa37-9af90e5e6e8a Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 334e2484-6711-4e03-af87-f1326f4970c8 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 57bee266-ce87-492b-8835-8822879b77d6 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a3ad0af3-c618-42bf-9111-ae1005b75895 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fbf17285-22bd-4061-b3ab-7660c8cbff2c Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5922c9f7-5141-4005-9210-10b6b09c1572 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 244e2fd8-549d-428c-a0c4-9f450c8acb92 Oct 11 04:02:57 localhost setroubleshoot[39498]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:03:06 localhost podman[39670]: 2025-10-11 08:02:52.098987087 +0000 UTC m=+0.028915632 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 Oct 11 04:03:06 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 04:03:06 localhost python3[39896]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 cluster.common.tag/cinder-backup:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:03:06 localhost podman[39897]: 2025-10-11 08:03:06.747577336 +0000 UTC m=+0.038534255 image tag a494a4709399d3b48f7a72d9a7ba248a8aef77a31bc332f2b941ea1a9802eb23 cluster.common.tag/cinder-backup:pcmklatest Oct 11 04:03:06 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 04:03:07 localhost python3[39924]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:03:07 localhost systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Oct 11 04:03:07 localhost systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.536s CPU time. Oct 11 04:03:07 localhost systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 11 04:03:07 localhost systemd[1]: setroubleshootd.service: Consumed 12.749s CPU time. Oct 11 04:03:16 localhost podman[39925]: 2025-10-11 08:03:07.355915654 +0000 UTC m=+0.034075547 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 Oct 11 04:03:16 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 04:03:16 localhost python3[40295]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 cluster.common.tag/cinder-volume:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:03:17 localhost podman[40296]: 2025-10-11 08:03:17.005833424 +0000 UTC m=+0.052643539 image tag 6478a0150ae96c1577ab98090485db34bd923bea7fbd99b449759855054ad48a cluster.common.tag/cinder-volume:pcmklatest Oct 11 04:03:17 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 04:03:17 localhost python3[40323]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active rsyslog _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:03:18 localhost python3[40340]: ansible-blockinfile Invoked with content=if $syslogfacility-text == 'local0' and $programname == 'haproxy' then -/var/log/containers/haproxy/haproxy.log#012& stop#012 create=True path=/etc/rsyslog.d/openstack-haproxy.conf block=if $syslogfacility-text == 'local0' and $programname == 'haproxy' then -/var/log/containers/haproxy/haproxy.log#012& stop#012 state=present marker=# {mark} ANSIBLE MANAGED BLOCK backup=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:03:18 localhost python3[40356]: ansible-ansible.legacy.systemd Invoked with name=rsyslog state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 08:03:18 np0005481012 systemd[1]: Stopping System Logging Service... Oct 11 08:03:19 np0005481012 rsyslogd[758]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="758" x-info="https://www.rsyslog.com"] exiting on signal 15. Oct 11 08:03:19 np0005481012 systemd[1]: rsyslog.service: Deactivated successfully. Oct 11 08:03:19 np0005481012 systemd[1]: Stopped System Logging Service. Oct 11 08:03:19 np0005481012 systemd[1]: rsyslog.service: Consumed 1.252s CPU time, read 920.0K from disk, written 3.4M to disk. Oct 11 08:03:19 np0005481012 systemd[1]: Starting System Logging Service... Oct 11 08:03:19 np0005481012 rsyslogd[40359]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="40359" x-info="https://www.rsyslog.com"] start Oct 11 08:03:19 np0005481012 systemd[1]: Started System Logging Service. Oct 11 08:03:19 np0005481012 rsyslogd[40359]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 08:03:19 np0005481012 python3[40378]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:03:25 np0005481012 podman[40379]: 2025-10-11 08:03:19.800473382 +0000 UTC m=+0.044356902 image pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Oct 11 08:03:25 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:25 np0005481012 python3[40490]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 cluster.common.tag/haproxy:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:03:25 np0005481012 podman[40491]: 2025-10-11 08:03:25.649454851 +0000 UTC m=+0.048832172 image tag ca7d8eb100efddb0a29cba30061b2c9178f350b380fee5b69208dfdf229628f7 cluster.common.tag/haproxy:pcmklatest Oct 11 08:03:25 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:26 np0005481012 python3[40517]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:03:29 np0005481012 python3[40534]: ansible-systemd Invoked with enabled=True masked=False name=certmonger.service state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None Oct 11 08:03:29 np0005481012 python3[40553]: ansible-file Invoked with path=/etc/pki/tls/certs/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Oct 11 08:03:30 np0005481012 python3[40569]: ansible-file Invoked with path=/etc/pki/tls/private/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Oct 11 08:03:30 np0005481012 python3[40585]: ansible-ansible.legacy.command Invoked with _raw_params=set -e#012ca_pem='/etc/pki/ca-trust/source/anchors/cm-local-ca.pem'#012openssl pkcs12 -in /var/lib/certmonger/local/creds -out ${ca_pem} -nokeys -nodes -passin pass:''#012chmod 0644 ${ca_pem}#012update-ca-trust extract#012test -e ${ca_pem} && openssl x509 -checkend 0 -noout -in ${ca_pem}#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:03:32 np0005481012 python3[40611]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:03:32 np0005481012 python3[40631]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:03:36 np0005481012 python3[40648]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:03:39 np0005481012 python3[40665]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:03:39 np0005481012 python3[40681]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:03:40 np0005481012 python3[40697]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:03:40 np0005481012 python3[40715]: ansible-certificate_request Invoked with name=haproxy-external-cert dns=['overcloud.ooo.test'] ip=[] principal=['haproxy/overcloud.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-external-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-external.crt"#012cp "/etc/pki/tls/private/haproxy-external-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-external.key"#012#012ca_type=ipa#012if [ "$ca_type" = "self-sign" ]; then#012 # refresh the ca cert just in case the ca cert has been renewed#012 ca_pem='/etc/pki/ca-trust/source/anchors/cm-local-ca.pem'#012 openssl pkcs12 -in /var/lib/certmonger/local/creds -out ${ca_pem} -nokeys -nodes -passin pass:''#012 chmod 0644 ${ca_pem}#012 update-ca-trust extract#012 test -e ${ca_pem} && openssl x509 -checkend 0 -noout -in ${ca_pem}#012 openssl x509 -in ${ca_pem} -out /tmp/cm-local-ca.pem#012 ca_path="/tmp/cm-local-ca.pem"#012else#012 ca_path="/etc/ipa/ca.crt"#012fi#012#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-external.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-external.key"#012service_pem="/etc/pki/tls/private/overcloud_endpoint.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:03:40 np0005481012 certmonger[38891]: 2025-10-11 08:03:40 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481012 certmonger[38891]: 2025-10-11 08:03:40 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481012 certmonger[38891]: 2025-10-11 08:03:40 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481012 certmonger[38891]: 2025-10-11 08:03:40 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481012 certmonger[38891]: 2025-10-11 08:03:40 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481012 certmonger[38891]: 2025-10-11 08:03:40 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481012 certmonger[38891]: 2025-10-11 08:03:40 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481012 certmonger[38891]: 2025-10-11 08:03:40 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481012 certmonger[38891]: 2025-10-11 08:03:40 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[40725]: 2025-10-11 08:03:41 [40725] Setting "CERTMONGER_REQ_SUBJECT" to "CN=overcloud.ooo.test" for child. Oct 11 08:03:41 np0005481012 certmonger[40725]: 2025-10-11 08:03:41 [40725] Setting "CERTMONGER_REQ_HOSTNAME" to "overcloud.ooo.test Oct 11 08:03:41 np0005481012 certmonger[40725]: " for child. Oct 11 08:03:41 np0005481012 certmonger[40725]: 2025-10-11 08:03:41 [40725] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/overcloud.ooo.test@OOO.TEST Oct 11 08:03:41 np0005481012 certmonger[40725]: " for child. Oct 11 08:03:41 np0005481012 certmonger[40725]: 2025-10-11 08:03:41 [40725] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:03:41 np0005481012 certmonger[40725]: 2025-10-11 08:03:41 [40725] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:03:41 np0005481012 certmonger[40725]: MIIDmjCCAoICAQAwHTEbMBkGA1UEAxMSb3ZlcmNsb3VkLm9vby50ZXN0MIIBIjAN Oct 11 08:03:41 np0005481012 certmonger[40725]: BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA34qd0z60HeZjJhs/DS9jua2VDsQB Oct 11 08:03:41 np0005481012 certmonger[40725]: LqfjUW/H0Lud/rq2lgZxTQdBAv5gMJA7ZabVxz0OZJpMW+UtEna8dX+bbXzITU3R Oct 11 08:03:41 np0005481012 certmonger[40725]: Ufa05v1jKEwO898cm7279BH85m8HVN6IXg2Yy3vS/jdQ4Ll4scu4wyBHDVPJi+K1 Oct 11 08:03:41 np0005481012 certmonger[40725]: Oh3X6jmlPpSoKmipv80OG+8OZtAoD9kF8tnsuFXzLOi3r/DbAFV0I+8ocAnna6wC Oct 11 08:03:41 np0005481012 certmonger[40725]: OiMpAtR8dg5qSPILhJpMxJGY8iwDQGgGzF6zEzTrt0XqCV8P5perrgCYncew6ISY Oct 11 08:03:41 np0005481012 certmonger[40725]: 3L88WVVu4s9yoXRAVa2Ywp+yUAksEhw6LnJavN2bOXsGKOMkEHC1mbBb9wIDAQAB Oct 11 08:03:41 np0005481012 certmonger[40725]: oIIBNjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAwADEAMQAwADgAMAAzADQA Oct 11 08:03:41 np0005481012 certmonger[40725]: MDCCAQUGCSqGSIb3DQEJDjGB9zCB9DALBgNVHQ8EBAMCBaAwgZgGA1UdEQSBkDCB Oct 11 08:03:41 np0005481012 certmonger[40725]: jYISb3ZlcmNsb3VkLm9vby50ZXN0oDMGCisGAQQBgjcUAgOgJQwjaGFwcm94eS9v Oct 11 08:03:41 np0005481012 certmonger[40725]: dmVyY2xvdWQub29vLnRlc3RAT09PLlRFU1SgQgYGKwYBBQICoDgwNqAKGwhPT08u Oct 11 08:03:41 np0005481012 certmonger[40725]: VEVTVKEoMCagAwIBAaEfMB0bB2hhcHJveHkbEm92ZXJjbG91ZC5vb28udGVzdDAd Oct 11 08:03:41 np0005481012 certmonger[40725]: BgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNV Oct 11 08:03:41 np0005481012 certmonger[40725]: HQ4EFgQU095XFnL3S93cfD8KsE2r36Tzv7wwDQYJKoZIhvcNAQELBQADggEBAMCK Oct 11 08:03:41 np0005481012 certmonger[40725]: uEcQRzUufPXpQ6jZKtO8idYlJEqmveFjs+b3kAxeNpS5W/M3tvuhKngMeJpumQrB Oct 11 08:03:41 np0005481012 certmonger[40725]: vVs6o9NVNNvHdScreUcKCPCIwbPd7hthSWLcpxSHSlbjWiEHOUtXT9fyBazVN/t3 Oct 11 08:03:41 np0005481012 certmonger[40725]: Y37xtVTz5Kac0YhebWdm7zm/YcJkHU5UzucohY2B1m3gHYmYVzKmKLMKEiH2GZgj Oct 11 08:03:41 np0005481012 certmonger[40725]: sS02S9pCwST+z00z/P73MPLLR/GbpQBE01ZrYj+vePDbc9vdK0R9Z1dPIGGbb81i Oct 11 08:03:41 np0005481012 certmonger[40725]: QNf763Tx/celvm/YKcxbazDIzZFykKgJtxzoUyRzx2Pzxw1PXuR/Wy3QZwg+sdVx Oct 11 08:03:41 np0005481012 certmonger[40725]: wX2d+jlfAunWMoiPoCE= Oct 11 08:03:41 np0005481012 certmonger[40725]: -----END CERTIFICATE REQUEST----- Oct 11 08:03:41 np0005481012 certmonger[40725]: " for child. Oct 11 08:03:41 np0005481012 certmonger[40725]: 2025-10-11 08:03:41 [40725] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDfip3TPrQd5mMmGz8NL2O5rZUOxAEup+NRb8fQu53+uraWBnFNB0EC/mAwkDtlptXHPQ5kmkxb5S0Sdrx1f5ttfMhNTdFR9rTm/WMoTA7z3xybvbv0EfzmbwdU3oheDZjLe9L+N1DguXixy7jDIEcNU8mL4rU6HdfqOaU+lKgqaKm/zQ4b7w5m0CgP2QXy2ey4VfMs6Lev8NsAVXQj7yhwCedrrAI6IykC1Hx2DmpI8guEmkzEkZjyLANAaAbMXrMTNOu3ReoJXw/ml6uuAJidx7DohJjcvzxZVW7iz3KhdEBVrZjCn7JQCSwSHDouclq83Zs5ewYo4yQQcLWZsFv3AgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAuGEd0GCV9vX3fg8nfNA6UPLYCE5F/mlWS281nqe4N/i3my+dx3P5RN9cGodbQSMfM7t+4pmdTviJEcPy6GaArQQKS0IqhlXRxGPsaD9INfl5O1waRd8eqCM9mDPEPUZHjapogD/Fv87GuMxaA3kHOLjNe/tf76b2bfagCYW/u9It2kI+pN1cP3gBr1tzeRm6iNbh7vTmPU9vykHtsYVQFJrXfz21lY0sYjC+C+bzF27eKx/NGtQEAwUimMHOTMzJh+G6zOw40kbTL+Q9oMYKBdZiDOjwum0BUslzKMWGsWKQ9hDidyBxdeHYpnS2Mj1fkn2Xrd8VvEB4AJP6rkHsjA==" for child. Oct 11 08:03:41 np0005481012 certmonger[40725]: 2025-10-11 08:03:41 [40725] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA34qd0z60HeZjJhs/DS9jua2VDsQBLqfjUW/H0Lud/rq2lgZxTQdBAv5gMJA7ZabVxz0OZJpMW+UtEna8dX+bbXzITU3RUfa05v1jKEwO898cm7279BH85m8HVN6IXg2Yy3vS/jdQ4Ll4scu4wyBHDVPJi+K1Oh3X6jmlPpSoKmipv80OG+8OZtAoD9kF8tnsuFXzLOi3r/DbAFV0I+8ocAnna6wCOiMpAtR8dg5qSPILhJpMxJGY8iwDQGgGzF6zEzTrt0XqCV8P5perrgCYncew6ISY3L88WVVu4s9yoXRAVa2Ywp+yUAksEhw6LnJavN2bOXsGKOMkEHC1mbBb9wIDAQAB" for child. Oct 11 08:03:41 np0005481012 certmonger[40725]: 2025-10-11 08:03:41 [40725] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:03:41 np0005481012 certmonger[40725]: 2025-10-11 08:03:41 [40725] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:03:41 np0005481012 certmonger[40725]: 2025-10-11 08:03:41 [40725] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:03:41 np0005481012 certmonger[40725]: 2025-10-11 08:03:41 [40725] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:03:41 np0005481012 certmonger[40725]: 2025-10-11 08:03:41 [40725] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[40725]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:03:41 np0005481012 certmonger[40725]: Certificate: "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" Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Certificate submission still ongoing. Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Certificate submission attempt complete. Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Child status = 0. Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Child output: Oct 11 08:03:41 np0005481012 certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 08:03:41 np0005481012 certmonger[38891]: MIIFHzCCA4egAwIBAgIBKjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:41 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:41 np0005481012 certmonger[38891]: MDM0MVoXDTI3MTAxMjA4MDM0MVowMDERMA8GA1UECgwIT09PLlRFU1QxGzAZBgNV Oct 11 08:03:41 np0005481012 certmonger[38891]: BAMMEm92ZXJjbG91ZC5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC Oct 11 08:03:41 np0005481012 certmonger[38891]: AQoCggEBAN+KndM+tB3mYyYbPw0vY7mtlQ7EAS6n41Fvx9C7nf66tpYGcU0HQQL+ Oct 11 08:03:41 np0005481012 certmonger[38891]: YDCQO2Wm1cc9DmSaTFvlLRJ2vHV/m218yE1N0VH2tOb9YyhMDvPfHJu9u/QR/OZv Oct 11 08:03:41 np0005481012 certmonger[38891]: B1TeiF4NmMt70v43UOC5eLHLuMMgRw1TyYvitTod1+o5pT6UqCpoqb/NDhvvDmbQ Oct 11 08:03:41 np0005481012 certmonger[38891]: KA/ZBfLZ7LhV8yzot6/w2wBVdCPvKHAJ52usAjojKQLUfHYOakjyC4SaTMSRmPIs Oct 11 08:03:41 np0005481012 certmonger[38891]: A0BoBsxesxM067dF6glfD+aXq64AmJ3HsOiEmNy/PFlVbuLPcqF0QFWtmMKfslAJ Oct 11 08:03:41 np0005481012 certmonger[38891]: LBIcOi5yWrzdmzl7BijjJBBwtZmwW/cCAwEAAaOCAb8wggG7MB8GA1UdIwQYMBaA Oct 11 08:03:41 np0005481012 certmonger[38891]: FKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcw Oct 11 08:03:41 np0005481012 certmonger[38891]: AYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE Oct 11 08:03:41 np0005481012 certmonger[38891]: 8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCg Oct 11 08:03:41 np0005481012 certmonger[38891]: LoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6i Oct 11 08:03:41 np0005481012 certmonger[38891]: NKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRo Oct 11 08:03:41 np0005481012 certmonger[38891]: b3JpdHkwHQYDVR0OBBYEFANI4Qq37h+eGNUyIuPuMw7e413rMIGYBgNVHREEgZAw Oct 11 08:03:41 np0005481012 certmonger[38891]: gY2CEm92ZXJjbG91ZC5vb28udGVzdKAzBgorBgEEAYI3FAIDoCUMI2hhcHJveHkv Oct 11 08:03:41 np0005481012 certmonger[38891]: b3ZlcmNsb3VkLm9vby50ZXN0QE9PTy5URVNUoEIGBisGAQUCAqA4MDagChsIT09P Oct 11 08:03:41 np0005481012 certmonger[38891]: LlRFU1ShKDAmoAMCAQGhHzAdGwdoYXByb3h5GxJvdmVyY2xvdWQub29vLnRlc3Qw Oct 11 08:03:41 np0005481012 certmonger[38891]: DQYJKoZIhvcNAQELBQADggGBAEASHX/jobWCX9lDWcL+r+3U+VF2kKR0iJxAyyzO Oct 11 08:03:41 np0005481012 certmonger[38891]: VXYFtRIOKeEFh8GQ0DriPTgpaHcCs8B5DR2I1FeY0TX4kVqni4T8WNwnQSD/qqkX Oct 11 08:03:41 np0005481012 certmonger[38891]: 9pdtjzIpxyrTlooyPw15wntLlGzo4gku+MnDvPMoiA4GWNtD8q20ix2zAc3MGUXf Oct 11 08:03:41 np0005481012 certmonger[38891]: kgQ5mdSSfKFrUyOFdqPEZL+ekIVG5TmTNMaLZkQd7hiIer19Tx+Qfhgq264LHsKQ Oct 11 08:03:41 np0005481012 certmonger[38891]: /HCGczzWroxOpxQAYJmbSkp5uvLAlOXx5FD0UkuBEa/6fyNGfytH684M7KRJI9FZ Oct 11 08:03:41 np0005481012 certmonger[38891]: WSxVhOK0+bUdtaQ/UeRmhWambiKEtsI29kgFQzaoxE5lsbI0otPEG4ShB4gAUd6P Oct 11 08:03:41 np0005481012 certmonger[38891]: bx0ESb+MP2JEN6b4WZyAmJp+PiAUXNvgeGPrbro/nsZNvlPxJ6G4x9Z0P/iwerrr Oct 11 08:03:41 np0005481012 certmonger[38891]: JtbCYvoJCKfFwu3ZHtSCfvSXy+kYEPC3a6PTYipf1xUNaWTwWmzsN0M7Jvfe93Ic Oct 11 08:03:41 np0005481012 certmonger[38891]: fVRqFOnFOv/9K1SnqJEeR7PmtA== Oct 11 08:03:41 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:03:41 np0005481012 certmonger[38891]: " Oct 11 08:03:41 np0005481012 certmonger[40727]: 2025-10-11 08:03:41 [40727] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:03:41 np0005481012 certmonger[40727]: MIIFHzCCA4egAwIBAgIBKjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:41 np0005481012 certmonger[40727]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:41 np0005481012 certmonger[40727]: MDM0MVoXDTI3MTAxMjA4MDM0MVowMDERMA8GA1UECgwIT09PLlRFU1QxGzAZBgNV Oct 11 08:03:41 np0005481012 certmonger[40727]: BAMMEm92ZXJjbG91ZC5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC Oct 11 08:03:41 np0005481012 certmonger[40727]: AQoCggEBAN+KndM+tB3mYyYbPw0vY7mtlQ7EAS6n41Fvx9C7nf66tpYGcU0HQQL+ Oct 11 08:03:41 np0005481012 certmonger[40727]: YDCQO2Wm1cc9DmSaTFvlLRJ2vHV/m218yE1N0VH2tOb9YyhMDvPfHJu9u/QR/OZv Oct 11 08:03:41 np0005481012 certmonger[40727]: B1TeiF4NmMt70v43UOC5eLHLuMMgRw1TyYvitTod1+o5pT6UqCpoqb/NDhvvDmbQ Oct 11 08:03:41 np0005481012 certmonger[40727]: KA/ZBfLZ7LhV8yzot6/w2wBVdCPvKHAJ52usAjojKQLUfHYOakjyC4SaTMSRmPIs Oct 11 08:03:41 np0005481012 certmonger[40727]: A0BoBsxesxM067dF6glfD+aXq64AmJ3HsOiEmNy/PFlVbuLPcqF0QFWtmMKfslAJ Oct 11 08:03:41 np0005481012 certmonger[40727]: LBIcOi5yWrzdmzl7BijjJBBwtZmwW/cCAwEAAaOCAb8wggG7MB8GA1UdIwQYMBaA Oct 11 08:03:41 np0005481012 certmonger[40727]: FKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcw Oct 11 08:03:41 np0005481012 certmonger[40727]: AYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE Oct 11 08:03:41 np0005481012 certmonger[40727]: 8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCg Oct 11 08:03:41 np0005481012 certmonger[40727]: LoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6i Oct 11 08:03:41 np0005481012 certmonger[40727]: NKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRo Oct 11 08:03:41 np0005481012 certmonger[40727]: b3JpdHkwHQYDVR0OBBYEFANI4Qq37h+eGNUyIuPuMw7e413rMIGYBgNVHREEgZAw Oct 11 08:03:41 np0005481012 certmonger[40727]: gY2CEm92ZXJjbG91ZC5vb28udGVzdKAzBgorBgEEAYI3FAIDoCUMI2hhcHJveHkv Oct 11 08:03:41 np0005481012 certmonger[40727]: b3ZlcmNsb3VkLm9vby50ZXN0QE9PTy5URVNUoEIGBisGAQUCAqA4MDagChsIT09P Oct 11 08:03:41 np0005481012 certmonger[40727]: LlRFU1ShKDAmoAMCAQGhHzAdGwdoYXByb3h5GxJvdmVyY2xvdWQub29vLnRlc3Qw Oct 11 08:03:41 np0005481012 certmonger[40727]: DQYJKoZIhvcNAQELBQADggGBAEASHX/jobWCX9lDWcL+r+3U+VF2kKR0iJxAyyzO Oct 11 08:03:41 np0005481012 certmonger[40727]: VXYFtRIOKeEFh8GQ0DriPTgpaHcCs8B5DR2I1FeY0TX4kVqni4T8WNwnQSD/qqkX Oct 11 08:03:41 np0005481012 certmonger[40727]: 9pdtjzIpxyrTlooyPw15wntLlGzo4gku+MnDvPMoiA4GWNtD8q20ix2zAc3MGUXf Oct 11 08:03:41 np0005481012 certmonger[40727]: kgQ5mdSSfKFrUyOFdqPEZL+ekIVG5TmTNMaLZkQd7hiIer19Tx+Qfhgq264LHsKQ Oct 11 08:03:41 np0005481012 certmonger[40727]: /HCGczzWroxOpxQAYJmbSkp5uvLAlOXx5FD0UkuBEa/6fyNGfytH684M7KRJI9FZ Oct 11 08:03:41 np0005481012 certmonger[40727]: WSxVhOK0+bUdtaQ/UeRmhWambiKEtsI29kgFQzaoxE5lsbI0otPEG4ShB4gAUd6P Oct 11 08:03:41 np0005481012 certmonger[40727]: bx0ESb+MP2JEN6b4WZyAmJp+PiAUXNvgeGPrbro/nsZNvlPxJ6G4x9Z0P/iwerrr Oct 11 08:03:41 np0005481012 certmonger[40727]: JtbCYvoJCKfFwu3ZHtSCfvSXy+kYEPC3a6PTYipf1xUNaWTwWmzsN0M7Jvfe93Ic Oct 11 08:03:41 np0005481012 certmonger[40727]: fVRqFOnFOv/9K1SnqJEeR7PmtA== Oct 11 08:03:41 np0005481012 certmonger[40727]: -----END CERTIFICATE----- Oct 11 08:03:41 np0005481012 certmonger[40727]: ". Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Certificate submission still ongoing. Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Certificate submission postprocessing complete. Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Child status = 0. Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Child output: Oct 11 08:03:41 np0005481012 certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nfVRqFOnFOv/9K1SnqJEeR7PmtA==\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:03:41 np0005481012 certmonger[38891]: " Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:03:41 np0005481012 certmonger[38891]: MIIFHzCCA4egAwIBAgIBKjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:41 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:41 np0005481012 certmonger[38891]: MDM0MVoXDTI3MTAxMjA4MDM0MVowMDERMA8GA1UECgwIT09PLlRFU1QxGzAZBgNV Oct 11 08:03:41 np0005481012 certmonger[38891]: BAMMEm92ZXJjbG91ZC5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC Oct 11 08:03:41 np0005481012 certmonger[38891]: AQoCggEBAN+KndM+tB3mYyYbPw0vY7mtlQ7EAS6n41Fvx9C7nf66tpYGcU0HQQL+ Oct 11 08:03:41 np0005481012 certmonger[38891]: YDCQO2Wm1cc9DmSaTFvlLRJ2vHV/m218yE1N0VH2tOb9YyhMDvPfHJu9u/QR/OZv Oct 11 08:03:41 np0005481012 certmonger[38891]: B1TeiF4NmMt70v43UOC5eLHLuMMgRw1TyYvitTod1+o5pT6UqCpoqb/NDhvvDmbQ Oct 11 08:03:41 np0005481012 certmonger[38891]: KA/ZBfLZ7LhV8yzot6/w2wBVdCPvKHAJ52usAjojKQLUfHYOakjyC4SaTMSRmPIs Oct 11 08:03:41 np0005481012 certmonger[38891]: A0BoBsxesxM067dF6glfD+aXq64AmJ3HsOiEmNy/PFlVbuLPcqF0QFWtmMKfslAJ Oct 11 08:03:41 np0005481012 certmonger[38891]: LBIcOi5yWrzdmzl7BijjJBBwtZmwW/cCAwEAAaOCAb8wggG7MB8GA1UdIwQYMBaA Oct 11 08:03:41 np0005481012 certmonger[38891]: FKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcw Oct 11 08:03:41 np0005481012 certmonger[38891]: AYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE Oct 11 08:03:41 np0005481012 certmonger[38891]: 8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCg Oct 11 08:03:41 np0005481012 certmonger[38891]: LoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6i Oct 11 08:03:41 np0005481012 certmonger[38891]: NKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRo Oct 11 08:03:41 np0005481012 certmonger[38891]: b3JpdHkwHQYDVR0OBBYEFANI4Qq37h+eGNUyIuPuMw7e413rMIGYBgNVHREEgZAw Oct 11 08:03:41 np0005481012 certmonger[38891]: gY2CEm92ZXJjbG91ZC5vb28udGVzdKAzBgorBgEEAYI3FAIDoCUMI2hhcHJveHkv Oct 11 08:03:41 np0005481012 certmonger[38891]: b3ZlcmNsb3VkLm9vby50ZXN0QE9PTy5URVNUoEIGBisGAQUCAqA4MDagChsIT09P Oct 11 08:03:41 np0005481012 certmonger[38891]: LlRFU1ShKDAmoAMCAQGhHzAdGwdoYXByb3h5GxJvdmVyY2xvdWQub29vLnRlc3Qw Oct 11 08:03:41 np0005481012 certmonger[38891]: DQYJKoZIhvcNAQELBQADggGBAEASHX/jobWCX9lDWcL+r+3U+VF2kKR0iJxAyyzO Oct 11 08:03:41 np0005481012 certmonger[38891]: VXYFtRIOKeEFh8GQ0DriPTgpaHcCs8B5DR2I1FeY0TX4kVqni4T8WNwnQSD/qqkX Oct 11 08:03:41 np0005481012 certmonger[38891]: 9pdtjzIpxyrTlooyPw15wntLlGzo4gku+MnDvPMoiA4GWNtD8q20ix2zAc3MGUXf Oct 11 08:03:41 np0005481012 certmonger[38891]: kgQ5mdSSfKFrUyOFdqPEZL+ekIVG5TmTNMaLZkQd7hiIer19Tx+Qfhgq264LHsKQ Oct 11 08:03:41 np0005481012 certmonger[38891]: /HCGczzWroxOpxQAYJmbSkp5uvLAlOXx5FD0UkuBEa/6fyNGfytH684M7KRJI9FZ Oct 11 08:03:41 np0005481012 certmonger[38891]: WSxVhOK0+bUdtaQ/UeRmhWambiKEtsI29kgFQzaoxE5lsbI0otPEG4ShB4gAUd6P Oct 11 08:03:41 np0005481012 certmonger[38891]: bx0ESb+MP2JEN6b4WZyAmJp+PiAUXNvgeGPrbro/nsZNvlPxJ6G4x9Z0P/iwerrr Oct 11 08:03:41 np0005481012 certmonger[38891]: JtbCYvoJCKfFwu3ZHtSCfvSXy+kYEPC3a6PTYipf1xUNaWTwWmzsN0M7Jvfe93Ic Oct 11 08:03:41 np0005481012 certmonger[38891]: fVRqFOnFOv/9K1SnqJEeR7PmtA== Oct 11 08:03:41 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:03:41 np0005481012 certmonger[38891]: ". Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] No hooks set for pre-save command. Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:41 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481012 certmonger[40797]: Certificate in file "/etc/pki/tls/certs/haproxy-external-cert.crt" issued by CA and saved. Oct 11 08:03:41 np0005481012 certmonger[38891]: 2025-10-11 08:03:41 [38891] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:42 np0005481012 python3[40813]: ansible-file Invoked with path=/etc/pki/tls/certs/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Oct 11 08:03:42 np0005481012 python3[40829]: ansible-file Invoked with path=/etc/pki/tls/private/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Oct 11 08:03:42 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:43 np0005481012 python3[40846]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:03:44 np0005481012 python3[40866]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:03:47 np0005481012 python3[40883]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:03:50 np0005481012 python3[40900]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:03:50 np0005481012 python3[40916]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:03:51 np0005481012 python3[40932]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:03:52 np0005481012 python3[40950]: ansible-certificate_request Invoked with name=haproxy-ctlplane-cert dns=['np0005481012.ctlplane.ooo.test', 'overcloud.ctlplane.ooo.test'] principal=['haproxy/np0005481012.ctlplane.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-ctlplane-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.crt"#012cp "/etc/pki/tls/private/haproxy-ctlplane-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-ctlplane.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-ctlplane.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:03:52 np0005481012 certmonger[38891]: 2025-10-11 08:03:52 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:52 np0005481012 certmonger[38891]: 2025-10-11 08:03:52 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:52 np0005481012 certmonger[38891]: 2025-10-11 08:03:52 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:52 np0005481012 certmonger[38891]: 2025-10-11 08:03:52 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:52 np0005481012 certmonger[38891]: 2025-10-11 08:03:52 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:52 np0005481012 certmonger[38891]: 2025-10-11 08:03:52 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:52 np0005481012 certmonger[38891]: 2025-10-11 08:03:52 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:52 np0005481012 certmonger[38891]: 2025-10-11 08:03:52 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:52 np0005481012 certmonger[38891]: 2025-10-11 08:03:52 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:52 np0005481012 certmonger[38891]: 2025-10-11 08:03:52 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:52 np0005481012 certmonger[38891]: 2025-10-11 08:03:52 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:52 np0005481012 certmonger[38891]: 2025-10-11 08:03:52 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:52 np0005481012 certmonger[38891]: 2025-10-11 08:03:52 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:52 np0005481012 certmonger[38891]: 2025-10-11 08:03:52 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:52 np0005481012 certmonger[38891]: 2025-10-11 08:03:52 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:52 np0005481012 certmonger[38891]: 2025-10-11 08:03:52 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:52 np0005481012 certmonger[38891]: 2025-10-11 08:03:52 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:52 np0005481012 certmonger[40960]: 2025-10-11 08:03:52 [40960] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481012.ctlplane.ooo.test" for child. Oct 11 08:03:52 np0005481012 certmonger[40960]: 2025-10-11 08:03:52 [40960] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481012.ctlplane.ooo.test Oct 11 08:03:52 np0005481012 certmonger[40960]: overcloud.ctlplane.ooo.test Oct 11 08:03:52 np0005481012 certmonger[40960]: " for child. Oct 11 08:03:52 np0005481012 certmonger[40960]: 2025-10-11 08:03:52 [40960] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005481012.ctlplane.ooo.test@OOO.TEST Oct 11 08:03:52 np0005481012 certmonger[40960]: " for child. Oct 11 08:03:52 np0005481012 certmonger[40960]: 2025-10-11 08:03:52 [40960] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:03:52 np0005481012 certmonger[40960]: 2025-10-11 08:03:52 [40960] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:03:52 np0005481012 certmonger[40960]: MIID6TCCAtECAQAwKTEnMCUGA1UEAxMebnAwMDA1NDgxMDEyLmN0bHBsYW5lLm9v Oct 11 08:03:52 np0005481012 certmonger[40960]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsN7uvDw8ijSY Oct 11 08:03:52 np0005481012 certmonger[40960]: gFrAMU41rdVEIvEvz/OtuEtV5EfrfDLFCKxT/RebEjICOHEsHJL4DtT4vk0GGCo5 Oct 11 08:03:52 np0005481012 certmonger[40960]: g7BO7eVi5j4zNuXXnzAuGh89pTo3iEl5q6O1411xhOW/jDYk1TUPlNWmvz7lev8J Oct 11 08:03:52 np0005481012 certmonger[40960]: B707gtlEgL0CAFV5dozuIxvdef7S+2CTn5Y/rdAemSBSc9mjnIrZlpeaxO+/lby6 Oct 11 08:03:52 np0005481012 certmonger[40960]: DVXNlyy+bF6HOEtw9poGHE63Lxy9PLaSFmJXm8QihilaDmnlf3qZZ+B4fRf0gTSz Oct 11 08:03:52 np0005481012 certmonger[40960]: bVKNd8ZrGBhr9EcBYFe3x/FETMGarn+NAfCFf84FfhoQ9v6YQvXrs4xkfGr+pgRv Oct 11 08:03:52 np0005481012 certmonger[40960]: luxDuLzWpQIDAQABoIIBeTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAwADEA Oct 11 08:03:52 np0005481012 certmonger[40960]: MQAwADgAMAAzADUAMjCCAUgGCSqGSIb3DQEJDjGCATkwggE1MAsGA1UdDwQEAwIF Oct 11 08:03:52 np0005481012 certmonger[40960]: oDCB2QYDVR0RBIHRMIHOgh5ucDAwMDU0ODEwMTIuY3RscGxhbmUub29vLnRlc3SC Oct 11 08:03:52 np0005481012 certmonger[40960]: G292ZXJjbG91ZC5jdGxwbGFuZS5vb28udGVzdKA/BgorBgEEAYI3FAIDoDEML2hh Oct 11 08:03:52 np0005481012 certmonger[40960]: cHJveHkvbnAwMDA1NDgxMDEyLmN0bHBsYW5lLm9vby50ZXN0QE9PTy5URVNUoE4G Oct 11 08:03:52 np0005481012 certmonger[40960]: BisGAQUCAqBEMEKgChsIT09PLlRFU1ShNDAyoAMCAQGhKzApGwdoYXByb3h5Gx5u Oct 11 08:03:52 np0005481012 certmonger[40960]: cDAwMDU0ODEwMTIuY3RscGxhbmUub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUH Oct 11 08:03:52 np0005481012 certmonger[40960]: AwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFP9+e0GgwLDJL3Xl Oct 11 08:03:52 np0005481012 certmonger[40960]: I3CO8GoqQ+aZMA0GCSqGSIb3DQEBCwUAA4IBAQCs1rhAw+/5IL5ZXfek0hCWw3jl Oct 11 08:03:52 np0005481012 certmonger[40960]: syKz85VZGdJUipHRwdpfP2Rh35Tjap7Ugm0xgNWckWpXUFrA2Ed9QM56aw0dcO0z Oct 11 08:03:52 np0005481012 certmonger[40960]: 8KpswpJd5l/L1KiL1Mcj0MmcF9avSLtyG6fSrTgc08LWdeCDYWuIX9MohPoENU9U Oct 11 08:03:52 np0005481012 certmonger[40960]: TKg9BlGyllpl5oEex0CLnW3jVA9sXaqrDyqSP5AkdQDPg/JjwguyI16+3/cmV+V4 Oct 11 08:03:52 np0005481012 certmonger[40960]: OTLuJjuF0x/MsO9XvJ6bW5y4jkYl3BjLGRhc/5EOFQvvdaItzmMulWDR+FnSl7mC Oct 11 08:03:52 np0005481012 certmonger[40960]: NPeNlhlNeF3MRcpQ+zHPt6kCQ9jx165x9IcMSMnURPkOwj7F2pHE+YOzkjc4 Oct 11 08:03:52 np0005481012 certmonger[40960]: -----END CERTIFICATE REQUEST----- Oct 11 08:03:52 np0005481012 certmonger[40960]: " for child. Oct 11 08:03:52 np0005481012 certmonger[40960]: 2025-10-11 08:03:52 [40960] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:03:52 np0005481012 certmonger[40960]: 2025-10-11 08:03:52 [40960] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsN7uvDw8ijSYgFrAMU41rdVEIvEvz/OtuEtV5EfrfDLFCKxT/RebEjICOHEsHJL4DtT4vk0GGCo5g7BO7eVi5j4zNuXXnzAuGh89pTo3iEl5q6O1411xhOW/jDYk1TUPlNWmvz7lev8JB707gtlEgL0CAFV5dozuIxvdef7S+2CTn5Y/rdAemSBSc9mjnIrZlpeaxO+/lby6DVXNlyy+bF6HOEtw9poGHE63Lxy9PLaSFmJXm8QihilaDmnlf3qZZ+B4fRf0gTSzbVKNd8ZrGBhr9EcBYFe3x/FETMGarn+NAfCFf84FfhoQ9v6YQvXrs4xkfGr+pgRvluxDuLzWpQIDAQAB" for child. Oct 11 08:03:52 np0005481012 certmonger[40960]: 2025-10-11 08:03:52 [40960] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:03:52 np0005481012 certmonger[40960]: 2025-10-11 08:03:52 [40960] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:03:52 np0005481012 certmonger[40960]: 2025-10-11 08:03:52 [40960] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:03:52 np0005481012 certmonger[40960]: 2025-10-11 08:03:52 [40960] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:03:52 np0005481012 certmonger[40960]: 2025-10-11 08:03:52 [40960] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:03:52 np0005481012 certmonger[38891]: 2025-10-11 08:03:52 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:52 np0005481012 certmonger[40960]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:03:53 np0005481012 certmonger[40960]: Certificate: "MIIFbDCCA9SgAwIBAgIBLDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4MDM1M1oXDTI3MTAxMjA4MDM1M1owPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTQ4MTAxMi5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALDe7rw8PIo0mIBawDFONa3VRCLxL8/zrbhLVeRH63wyxQisU/0XmxIyAjhxLByS+A7U+L5NBhgqOYOwTu3lYuY+Mzbl158wLhofPaU6N4hJeaujteNdcYTlv4w2JNU1D5TVpr8+5Xr/CQe9O4LZRIC9AgBVeXaM7iMb3Xn+0vtgk5+WP63QHpkgUnPZo5yK2ZaXmsTvv5W8ug1VzZcsvmxehzhLcPaaBhxOty8cvTy2khZiV5vEIoYpWg5p5X96mWfgeH0X9IE0s21SjXfGaxgYa/RHAWBXt8fxREzBmq5/jQHwhX/OBX4aEPb+mEL167OMZHxq/qYEb5bsQ7i81qUCAwEAAaOCAgAwggH8MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFDrJHMq+6dRRu+0787JQR7Y4tGxvMIHZBgNVHREEgdEwgc6CHm5wMDAwNTQ4MTAxMi5jdGxwbGFuZS5vb28udGVzdIIbb3ZlcmNsb3VkLmN0bHBsYW5lLm9vby50ZXN0oD8GCisGAQQBgjcUAgOgMQwvaGFwcm94eS9ucDAwMDU0ODEwMTIuY3RscGxhbmUub29vLnRlc3RAT09PLlRFU1SgTgYGKwYBBQICoEQwQqAKGwhPT08uVEVTVKE0MDKgAwIBAaErMCkbB2hhcHJveHkbHm5wMDAwNTQ4MTAxMi5jdGxwbGFuZS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAbuI6s8C4QSnp3pQzwIiwAdYOcnMnn+XZNoTbx/5oOMbZcG05FCJc8Nqwaa6MPAayfrM2SKnAMc6ij0Si8lIB31giUiE1rx96kbYb7CW+zgdh72xDA5vDrz/KbsZiZ220m4QDD7KJCEoRRGD3YFlM9GLozOmlLijZAJpjDxOV5ZE4bKzNEoXJf8GQ1FQWtdvUwfdT7BTz05Kq+Y7noMRT0q5v6dNoNV7tvvIv2hyEIRql/PQuBKNT3B+Z/K8XaBYAPpd3eNjz6sA2CNhkOfVFqA4CQTg7Pl0x9rcsohE4WW/h32AoWVyE0O8NuKTWBD+gnbNQQf/rHZtXZZb0nfPz6YtlF9N5U/yQDkCK3ciqI0kCKuJ4aszYSPpGgctUmdpyZhwI0WFM0n5+xRzD1as5sXeHrML3WIuxIeLr8Ff445EQJWB72fQjS9DTsx/ODDyS8tpr0IWJfy12n2xF3lb4SK/HVnBTgt1v6Sfif9Tsm/j17oEtfXQzxuzeHpjwezEN" Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Certificate submission still ongoing. Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Certificate submission attempt complete. Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Child status = 0. Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Child output: Oct 11 08:03:53 np0005481012 certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 08:03:53 np0005481012 certmonger[38891]: MIIFbDCCA9SgAwIBAgIBLDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:53 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:53 np0005481012 certmonger[38891]: MDM1M1oXDTI3MTAxMjA4MDM1M1owPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Oct 11 08:03:53 np0005481012 certmonger[38891]: BAMMHm5wMDAwNTQ4MTAxMi5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Oct 11 08:03:53 np0005481012 certmonger[38891]: AQEBBQADggEPADCCAQoCggEBALDe7rw8PIo0mIBawDFONa3VRCLxL8/zrbhLVeRH Oct 11 08:03:53 np0005481012 certmonger[38891]: 63wyxQisU/0XmxIyAjhxLByS+A7U+L5NBhgqOYOwTu3lYuY+Mzbl158wLhofPaU6 Oct 11 08:03:53 np0005481012 certmonger[38891]: N4hJeaujteNdcYTlv4w2JNU1D5TVpr8+5Xr/CQe9O4LZRIC9AgBVeXaM7iMb3Xn+ Oct 11 08:03:53 np0005481012 certmonger[38891]: 0vtgk5+WP63QHpkgUnPZo5yK2ZaXmsTvv5W8ug1VzZcsvmxehzhLcPaaBhxOty8c Oct 11 08:03:53 np0005481012 certmonger[38891]: vTy2khZiV5vEIoYpWg5p5X96mWfgeH0X9IE0s21SjXfGaxgYa/RHAWBXt8fxREzB Oct 11 08:03:53 np0005481012 certmonger[38891]: mq5/jQHwhX/OBX4aEPb+mEL167OMZHxq/qYEb5bsQ7i81qUCAwEAAaOCAgAwggH8 Oct 11 08:03:53 np0005481012 certmonger[38891]: MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4w Oct 11 08:03:53 np0005481012 certmonger[38891]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Oct 11 08:03:53 np0005481012 certmonger[38891]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Oct 11 08:03:53 np0005481012 certmonger[38891]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Oct 11 08:03:53 np0005481012 certmonger[38891]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Oct 11 08:03:53 np0005481012 certmonger[38891]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFDrJHMq+6dRRu+0787JQR7Y4tGxv Oct 11 08:03:53 np0005481012 certmonger[38891]: MIHZBgNVHREEgdEwgc6CHm5wMDAwNTQ4MTAxMi5jdGxwbGFuZS5vb28udGVzdIIb Oct 11 08:03:53 np0005481012 certmonger[38891]: b3ZlcmNsb3VkLmN0bHBsYW5lLm9vby50ZXN0oD8GCisGAQQBgjcUAgOgMQwvaGFw Oct 11 08:03:53 np0005481012 certmonger[38891]: cm94eS9ucDAwMDU0ODEwMTIuY3RscGxhbmUub29vLnRlc3RAT09PLlRFU1SgTgYG Oct 11 08:03:53 np0005481012 certmonger[38891]: KwYBBQICoEQwQqAKGwhPT08uVEVTVKE0MDKgAwIBAaErMCkbB2hhcHJveHkbHm5w Oct 11 08:03:53 np0005481012 certmonger[38891]: MDAwNTQ4MTAxMi5jdGxwbGFuZS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Oct 11 08:03:53 np0005481012 certmonger[38891]: buI6s8C4QSnp3pQzwIiwAdYOcnMnn+XZNoTbx/5oOMbZcG05FCJc8Nqwaa6MPAay Oct 11 08:03:53 np0005481012 certmonger[38891]: frM2SKnAMc6ij0Si8lIB31giUiE1rx96kbYb7CW+zgdh72xDA5vDrz/KbsZiZ220 Oct 11 08:03:53 np0005481012 certmonger[38891]: m4QDD7KJCEoRRGD3YFlM9GLozOmlLijZAJpjDxOV5ZE4bKzNEoXJf8GQ1FQWtdvU Oct 11 08:03:53 np0005481012 certmonger[38891]: wfdT7BTz05Kq+Y7noMRT0q5v6dNoNV7tvvIv2hyEIRql/PQuBKNT3B+Z/K8XaBYA Oct 11 08:03:53 np0005481012 certmonger[38891]: Ppd3eNjz6sA2CNhkOfVFqA4CQTg7Pl0x9rcsohE4WW/h32AoWVyE0O8NuKTWBD+g Oct 11 08:03:53 np0005481012 certmonger[38891]: nbNQQf/rHZtXZZb0nfPz6YtlF9N5U/yQDkCK3ciqI0kCKuJ4aszYSPpGgctUmdpy Oct 11 08:03:53 np0005481012 certmonger[38891]: ZhwI0WFM0n5+xRzD1as5sXeHrML3WIuxIeLr8Ff445EQJWB72fQjS9DTsx/ODDyS Oct 11 08:03:53 np0005481012 certmonger[38891]: 8tpr0IWJfy12n2xF3lb4SK/HVnBTgt1v6Sfif9Tsm/j17oEtfXQzxuzeHpjwezEN Oct 11 08:03:53 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:03:53 np0005481012 certmonger[38891]: " Oct 11 08:03:53 np0005481012 certmonger[40962]: 2025-10-11 08:03:53 [40962] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:03:53 np0005481012 certmonger[40962]: MIIFbDCCA9SgAwIBAgIBLDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:53 np0005481012 certmonger[40962]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:53 np0005481012 certmonger[40962]: MDM1M1oXDTI3MTAxMjA4MDM1M1owPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Oct 11 08:03:53 np0005481012 certmonger[40962]: BAMMHm5wMDAwNTQ4MTAxMi5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Oct 11 08:03:53 np0005481012 certmonger[40962]: AQEBBQADggEPADCCAQoCggEBALDe7rw8PIo0mIBawDFONa3VRCLxL8/zrbhLVeRH Oct 11 08:03:53 np0005481012 certmonger[40962]: 63wyxQisU/0XmxIyAjhxLByS+A7U+L5NBhgqOYOwTu3lYuY+Mzbl158wLhofPaU6 Oct 11 08:03:53 np0005481012 certmonger[40962]: N4hJeaujteNdcYTlv4w2JNU1D5TVpr8+5Xr/CQe9O4LZRIC9AgBVeXaM7iMb3Xn+ Oct 11 08:03:53 np0005481012 certmonger[40962]: 0vtgk5+WP63QHpkgUnPZo5yK2ZaXmsTvv5W8ug1VzZcsvmxehzhLcPaaBhxOty8c Oct 11 08:03:53 np0005481012 certmonger[40962]: vTy2khZiV5vEIoYpWg5p5X96mWfgeH0X9IE0s21SjXfGaxgYa/RHAWBXt8fxREzB Oct 11 08:03:53 np0005481012 certmonger[40962]: mq5/jQHwhX/OBX4aEPb+mEL167OMZHxq/qYEb5bsQ7i81qUCAwEAAaOCAgAwggH8 Oct 11 08:03:53 np0005481012 certmonger[40962]: MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4w Oct 11 08:03:53 np0005481012 certmonger[40962]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Oct 11 08:03:53 np0005481012 certmonger[40962]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Oct 11 08:03:53 np0005481012 certmonger[40962]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Oct 11 08:03:53 np0005481012 certmonger[40962]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Oct 11 08:03:53 np0005481012 certmonger[40962]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFDrJHMq+6dRRu+0787JQR7Y4tGxv Oct 11 08:03:53 np0005481012 certmonger[40962]: MIHZBgNVHREEgdEwgc6CHm5wMDAwNTQ4MTAxMi5jdGxwbGFuZS5vb28udGVzdIIb Oct 11 08:03:53 np0005481012 certmonger[40962]: b3ZlcmNsb3VkLmN0bHBsYW5lLm9vby50ZXN0oD8GCisGAQQBgjcUAgOgMQwvaGFw Oct 11 08:03:53 np0005481012 certmonger[40962]: cm94eS9ucDAwMDU0ODEwMTIuY3RscGxhbmUub29vLnRlc3RAT09PLlRFU1SgTgYG Oct 11 08:03:53 np0005481012 certmonger[40962]: KwYBBQICoEQwQqAKGwhPT08uVEVTVKE0MDKgAwIBAaErMCkbB2hhcHJveHkbHm5w Oct 11 08:03:53 np0005481012 certmonger[40962]: MDAwNTQ4MTAxMi5jdGxwbGFuZS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Oct 11 08:03:53 np0005481012 certmonger[40962]: buI6s8C4QSnp3pQzwIiwAdYOcnMnn+XZNoTbx/5oOMbZcG05FCJc8Nqwaa6MPAay Oct 11 08:03:53 np0005481012 certmonger[40962]: frM2SKnAMc6ij0Si8lIB31giUiE1rx96kbYb7CW+zgdh72xDA5vDrz/KbsZiZ220 Oct 11 08:03:53 np0005481012 certmonger[40962]: m4QDD7KJCEoRRGD3YFlM9GLozOmlLijZAJpjDxOV5ZE4bKzNEoXJf8GQ1FQWtdvU Oct 11 08:03:53 np0005481012 certmonger[40962]: wfdT7BTz05Kq+Y7noMRT0q5v6dNoNV7tvvIv2hyEIRql/PQuBKNT3B+Z/K8XaBYA Oct 11 08:03:53 np0005481012 certmonger[40962]: Ppd3eNjz6sA2CNhkOfVFqA4CQTg7Pl0x9rcsohE4WW/h32AoWVyE0O8NuKTWBD+g Oct 11 08:03:53 np0005481012 certmonger[40962]: nbNQQf/rHZtXZZb0nfPz6YtlF9N5U/yQDkCK3ciqI0kCKuJ4aszYSPpGgctUmdpy Oct 11 08:03:53 np0005481012 certmonger[40962]: ZhwI0WFM0n5+xRzD1as5sXeHrML3WIuxIeLr8Ff445EQJWB72fQjS9DTsx/ODDyS Oct 11 08:03:53 np0005481012 certmonger[40962]: 8tpr0IWJfy12n2xF3lb4SK/HVnBTgt1v6Sfif9Tsm/j17oEtfXQzxuzeHpjwezEN Oct 11 08:03:53 np0005481012 certmonger[40962]: -----END CERTIFICATE----- Oct 11 08:03:53 np0005481012 certmonger[40962]: ". Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Certificate submission still ongoing. Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Certificate submission postprocessing complete. Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Child status = 0. Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Child output: Oct 11 08:03:53 np0005481012 certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:03:53 np0005481012 certmonger[38891]: " Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:03:53 np0005481012 certmonger[38891]: MIIFbDCCA9SgAwIBAgIBLDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:53 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:53 np0005481012 certmonger[38891]: MDM1M1oXDTI3MTAxMjA4MDM1M1owPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Oct 11 08:03:53 np0005481012 certmonger[38891]: BAMMHm5wMDAwNTQ4MTAxMi5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Oct 11 08:03:53 np0005481012 certmonger[38891]: AQEBBQADggEPADCCAQoCggEBALDe7rw8PIo0mIBawDFONa3VRCLxL8/zrbhLVeRH Oct 11 08:03:53 np0005481012 certmonger[38891]: 63wyxQisU/0XmxIyAjhxLByS+A7U+L5NBhgqOYOwTu3lYuY+Mzbl158wLhofPaU6 Oct 11 08:03:53 np0005481012 certmonger[38891]: N4hJeaujteNdcYTlv4w2JNU1D5TVpr8+5Xr/CQe9O4LZRIC9AgBVeXaM7iMb3Xn+ Oct 11 08:03:53 np0005481012 certmonger[38891]: 0vtgk5+WP63QHpkgUnPZo5yK2ZaXmsTvv5W8ug1VzZcsvmxehzhLcPaaBhxOty8c Oct 11 08:03:53 np0005481012 certmonger[38891]: vTy2khZiV5vEIoYpWg5p5X96mWfgeH0X9IE0s21SjXfGaxgYa/RHAWBXt8fxREzB Oct 11 08:03:53 np0005481012 certmonger[38891]: mq5/jQHwhX/OBX4aEPb+mEL167OMZHxq/qYEb5bsQ7i81qUCAwEAAaOCAgAwggH8 Oct 11 08:03:53 np0005481012 certmonger[38891]: MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4w Oct 11 08:03:53 np0005481012 certmonger[38891]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Oct 11 08:03:53 np0005481012 certmonger[38891]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Oct 11 08:03:53 np0005481012 certmonger[38891]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Oct 11 08:03:53 np0005481012 certmonger[38891]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Oct 11 08:03:53 np0005481012 certmonger[38891]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFDrJHMq+6dRRu+0787JQR7Y4tGxv Oct 11 08:03:53 np0005481012 certmonger[38891]: MIHZBgNVHREEgdEwgc6CHm5wMDAwNTQ4MTAxMi5jdGxwbGFuZS5vb28udGVzdIIb Oct 11 08:03:53 np0005481012 certmonger[38891]: b3ZlcmNsb3VkLmN0bHBsYW5lLm9vby50ZXN0oD8GCisGAQQBgjcUAgOgMQwvaGFw Oct 11 08:03:53 np0005481012 certmonger[38891]: cm94eS9ucDAwMDU0ODEwMTIuY3RscGxhbmUub29vLnRlc3RAT09PLlRFU1SgTgYG Oct 11 08:03:53 np0005481012 certmonger[38891]: KwYBBQICoEQwQqAKGwhPT08uVEVTVKE0MDKgAwIBAaErMCkbB2hhcHJveHkbHm5w Oct 11 08:03:53 np0005481012 certmonger[38891]: MDAwNTQ4MTAxMi5jdGxwbGFuZS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Oct 11 08:03:53 np0005481012 certmonger[38891]: buI6s8C4QSnp3pQzwIiwAdYOcnMnn+XZNoTbx/5oOMbZcG05FCJc8Nqwaa6MPAay Oct 11 08:03:53 np0005481012 certmonger[38891]: frM2SKnAMc6ij0Si8lIB31giUiE1rx96kbYb7CW+zgdh72xDA5vDrz/KbsZiZ220 Oct 11 08:03:53 np0005481012 certmonger[38891]: m4QDD7KJCEoRRGD3YFlM9GLozOmlLijZAJpjDxOV5ZE4bKzNEoXJf8GQ1FQWtdvU Oct 11 08:03:53 np0005481012 certmonger[38891]: wfdT7BTz05Kq+Y7noMRT0q5v6dNoNV7tvvIv2hyEIRql/PQuBKNT3B+Z/K8XaBYA Oct 11 08:03:53 np0005481012 certmonger[38891]: Ppd3eNjz6sA2CNhkOfVFqA4CQTg7Pl0x9rcsohE4WW/h32AoWVyE0O8NuKTWBD+g Oct 11 08:03:53 np0005481012 certmonger[38891]: nbNQQf/rHZtXZZb0nfPz6YtlF9N5U/yQDkCK3ciqI0kCKuJ4aszYSPpGgctUmdpy Oct 11 08:03:53 np0005481012 certmonger[38891]: ZhwI0WFM0n5+xRzD1as5sXeHrML3WIuxIeLr8Ff445EQJWB72fQjS9DTsx/ODDyS Oct 11 08:03:53 np0005481012 certmonger[38891]: 8tpr0IWJfy12n2xF3lb4SK/HVnBTgt1v6Sfif9Tsm/j17oEtfXQzxuzeHpjwezEN Oct 11 08:03:53 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:03:53 np0005481012 certmonger[38891]: ". Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] No hooks set for pre-save command. Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:53 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:53 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:53 np0005481012 certmonger[41031]: Certificate in file "/etc/pki/tls/certs/haproxy-ctlplane-cert.crt" issued by CA and saved. Oct 11 08:03:53 np0005481012 certmonger[38891]: 2025-10-11 08:03:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080352 Oct 11 08:03:54 np0005481012 python3[41047]: ansible-certificate_request Invoked with name=haproxy-storage-cert dns=['np0005481012.storage.ooo.test', 'overcloud.storage.ooo.test'] principal=['haproxy/np0005481012.storage.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-storage-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.crt"#012cp "/etc/pki/tls/private/haproxy-storage-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-storage.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-storage.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:03:54 np0005481012 certmonger[38891]: 2025-10-11 08:03:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:54 np0005481012 certmonger[38891]: 2025-10-11 08:03:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:54 np0005481012 certmonger[38891]: 2025-10-11 08:03:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:54 np0005481012 certmonger[38891]: 2025-10-11 08:03:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:54 np0005481012 certmonger[38891]: 2025-10-11 08:03:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:54 np0005481012 certmonger[38891]: 2025-10-11 08:03:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:54 np0005481012 certmonger[38891]: 2025-10-11 08:03:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:54 np0005481012 certmonger[38891]: 2025-10-11 08:03:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:54 np0005481012 certmonger[38891]: 2025-10-11 08:03:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:54 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:54 np0005481012 certmonger[38891]: 2025-10-11 08:03:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:54 np0005481012 certmonger[38891]: 2025-10-11 08:03:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:54 np0005481012 certmonger[38891]: 2025-10-11 08:03:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:54 np0005481012 certmonger[38891]: 2025-10-11 08:03:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:54 np0005481012 certmonger[38891]: 2025-10-11 08:03:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:54 np0005481012 certmonger[38891]: 2025-10-11 08:03:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:54 np0005481012 certmonger[38891]: 2025-10-11 08:03:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:54 np0005481012 certmonger[38891]: 2025-10-11 08:03:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:54 np0005481012 certmonger[41057]: 2025-10-11 08:03:54 [41057] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481012.storage.ooo.test" for child. Oct 11 08:03:54 np0005481012 certmonger[41057]: 2025-10-11 08:03:54 [41057] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481012.storage.ooo.test Oct 11 08:03:54 np0005481012 certmonger[41057]: overcloud.storage.ooo.test Oct 11 08:03:54 np0005481012 certmonger[41057]: " for child. Oct 11 08:03:54 np0005481012 certmonger[41057]: 2025-10-11 08:03:54 [41057] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005481012.storage.ooo.test@OOO.TEST Oct 11 08:03:54 np0005481012 certmonger[41057]: " for child. Oct 11 08:03:54 np0005481012 certmonger[41057]: 2025-10-11 08:03:54 [41057] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:03:54 np0005481012 certmonger[41057]: 2025-10-11 08:03:54 [41057] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:03:54 np0005481012 certmonger[41057]: MIID5DCCAswCAQAwKDEmMCQGA1UEAxMdbnAwMDA1NDgxMDEyLnN0b3JhZ2Uub29v Oct 11 08:03:54 np0005481012 certmonger[41057]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCfoIqpIMd+S52X Oct 11 08:03:54 np0005481012 certmonger[41057]: vTb0UWIkc+qEYboS/rWYIynoGa8W0dGgaSYy2+ABVDyF9Rn2po4JVhLSdHptB+7w Oct 11 08:03:54 np0005481012 certmonger[41057]: PwoNsLLUTpSOrB9TameL65bpt3pXWfzFVv7zxgZDCz57EdqPrGByLjQiAxIF1CV9 Oct 11 08:03:54 np0005481012 certmonger[41057]: gm7EO9AAJXeyt7rkXioWnWoZzjtBgHvnmvtS3vyJgbjJ1p8Q4MXOgydaJ5HQOEOv Oct 11 08:03:54 np0005481012 certmonger[41057]: EuAj1DF/LZNRdn/uCBwXCj4CxH5CrP71THrBYgvgQ8aSp+dt68S7FU2pJ1AfV2ZX Oct 11 08:03:54 np0005481012 certmonger[41057]: 5YNR25YRv91PZPVaUEJHbyShNd/hFMeWYZbeUydUStyo7JtT0AEXbprJvKtvzpWV Oct 11 08:03:54 np0005481012 certmonger[41057]: JwlNiFd9AgMBAAGgggF1MCsGCSqGSIb3DQEJFDEeHhwAMgAwADIANQAxADAAMQAx Oct 11 08:03:54 np0005481012 certmonger[41057]: ADAAOAAwADMANQA0MIIBRAYJKoZIhvcNAQkOMYIBNTCCATEwCwYDVR0PBAQDAgWg Oct 11 08:03:54 np0005481012 certmonger[41057]: MIHVBgNVHREEgc0wgcqCHW5wMDAwNTQ4MTAxMi5zdG9yYWdlLm9vby50ZXN0ghpv Oct 11 08:03:54 np0005481012 certmonger[41057]: dmVyY2xvdWQuc3RvcmFnZS5vb28udGVzdKA+BgorBgEEAYI3FAIDoDAMLmhhcHJv Oct 11 08:03:54 np0005481012 certmonger[41057]: eHkvbnAwMDA1NDgxMDEyLnN0b3JhZ2Uub29vLnRlc3RAT09PLlRFU1SgTQYGKwYB Oct 11 08:03:54 np0005481012 certmonger[41057]: BQICoEMwQaAKGwhPT08uVEVTVKEzMDGgAwIBAaEqMCgbB2hhcHJveHkbHW5wMDAw Oct 11 08:03:54 np0005481012 certmonger[41057]: NTQ4MTAxMi5zdG9yYWdlLm9vby50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggr Oct 11 08:03:54 np0005481012 certmonger[41057]: BgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBTUzmWaGRadMVGCe0RhR8oX Oct 11 08:03:54 np0005481012 certmonger[41057]: +U+XhDANBgkqhkiG9w0BAQsFAAOCAQEAGMnsnsLdCrmzd/lQwtccToHfKhrJxgtF Oct 11 08:03:54 np0005481012 certmonger[41057]: 85lULUpwpAfQ2uz0rnCjyGCp2Ba/WJZq8IzU/R7OwcyuAfZSkmYbYG0P2AJxrnIK Oct 11 08:03:54 np0005481012 certmonger[41057]: ictI8vRqsNx/b+y+ldqPQBrB8jzo6S1f5TWVqviCQzSDf4BDIEdCexy7tY5WjOZM Oct 11 08:03:54 np0005481012 certmonger[41057]: AWHMKDHz0zb6/vj6MKcB4HYE2Az1MQLlPJFUYU5NIEpxe2r/6tzFOlwbC8Wq6EIB Oct 11 08:03:54 np0005481012 certmonger[41057]: I5KajeDatJXB8DC7zm9tubGkgDBGf/PM6PUcuh5KitMPy/Pxx5Zf1jT3ez7tqD2l Oct 11 08:03:54 np0005481012 certmonger[41057]: QvkeayZ+Mj0EIu6r090vgJd0Qq6/3Vu7CIEqng9EpxmIHeP28nr8FA== Oct 11 08:03:54 np0005481012 certmonger[41057]: -----END CERTIFICATE REQUEST----- Oct 11 08:03:54 np0005481012 certmonger[41057]: " for child. Oct 11 08:03:54 np0005481012 certmonger[41057]: 2025-10-11 08:03:54 [41057] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:03:54 np0005481012 certmonger[41057]: 2025-10-11 08:03:54 [41057] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAn6CKqSDHfkudl7029FFiJHPqhGG6Ev61mCMp6BmvFtHRoGkmMtvgAVQ8hfUZ9qaOCVYS0nR6bQfu8D8KDbCy1E6UjqwfU2pni+uW6bd6V1n8xVb+88YGQws+exHaj6xgci40IgMSBdQlfYJuxDvQACV3sre65F4qFp1qGc47QYB755r7Ut78iYG4ydafEODFzoMnWieR0DhDrxLgI9Qxfy2TUXZ/7ggcFwo+AsR+Qqz+9Ux6wWIL4EPGkqfnbevEuxVNqSdQH1dmV+WDUduWEb/dT2T1WlBCR28koTXf4RTHlmGW3lMnVErcqOybU9ABF26aybyrb86VlScJTYhXfQIDAQAB" for child. Oct 11 08:03:54 np0005481012 certmonger[41057]: 2025-10-11 08:03:54 [41057] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:03:54 np0005481012 certmonger[41057]: 2025-10-11 08:03:54 [41057] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:03:54 np0005481012 certmonger[41057]: 2025-10-11 08:03:54 [41057] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:03:54 np0005481012 certmonger[41057]: 2025-10-11 08:03:54 [41057] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:03:54 np0005481012 certmonger[41057]: 2025-10-11 08:03:54 [41057] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:03:54 np0005481012 certmonger[38891]: 2025-10-11 08:03:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:54 np0005481012 certmonger[41057]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:03:55 np0005481012 certmonger[41057]: Certificate: "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" Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Certificate submission still ongoing. Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Certificate submission attempt complete. Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Child status = 0. Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Child output: Oct 11 08:03:55 np0005481012 certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 08:03:55 np0005481012 certmonger[38891]: MIIFZzCCA8+gAwIBAgIBLzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:55 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:55 np0005481012 certmonger[38891]: MDM1NFoXDTI3MTAxMjA4MDM1NFowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Oct 11 08:03:55 np0005481012 certmonger[38891]: BAMMHW5wMDAwNTQ4MTAxMi5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Oct 11 08:03:55 np0005481012 certmonger[38891]: AQEFAAOCAQ8AMIIBCgKCAQEAn6CKqSDHfkudl7029FFiJHPqhGG6Ev61mCMp6Bmv Oct 11 08:03:55 np0005481012 certmonger[38891]: FtHRoGkmMtvgAVQ8hfUZ9qaOCVYS0nR6bQfu8D8KDbCy1E6UjqwfU2pni+uW6bd6 Oct 11 08:03:55 np0005481012 certmonger[38891]: V1n8xVb+88YGQws+exHaj6xgci40IgMSBdQlfYJuxDvQACV3sre65F4qFp1qGc47 Oct 11 08:03:55 np0005481012 certmonger[38891]: QYB755r7Ut78iYG4ydafEODFzoMnWieR0DhDrxLgI9Qxfy2TUXZ/7ggcFwo+AsR+ Oct 11 08:03:55 np0005481012 certmonger[38891]: Qqz+9Ux6wWIL4EPGkqfnbevEuxVNqSdQH1dmV+WDUduWEb/dT2T1WlBCR28koTXf Oct 11 08:03:55 np0005481012 certmonger[38891]: 4RTHlmGW3lMnVErcqOybU9ABF26aybyrb86VlScJTYhXfQIDAQABo4IB/DCCAfgw Oct 11 08:03:55 np0005481012 certmonger[38891]: HwYDVR0jBBgwFoAUpmo3qgn1Gyf8p8PaklOw1w0+KGkwOgYIKwYBBQUHAQEELjAs Oct 11 08:03:55 np0005481012 certmonger[38891]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Oct 11 08:03:55 np0005481012 certmonger[38891]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Oct 11 08:03:55 np0005481012 certmonger[38891]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Oct 11 08:03:55 np0005481012 certmonger[38891]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Oct 11 08:03:55 np0005481012 certmonger[38891]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUUILUZH50erUsf5+lj6t4hc6TgIkw Oct 11 08:03:55 np0005481012 certmonger[38891]: gdUGA1UdEQSBzTCByoIdbnAwMDA1NDgxMDEyLnN0b3JhZ2Uub29vLnRlc3SCGm92 Oct 11 08:03:55 np0005481012 certmonger[38891]: ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQBgjcUAgOgMAwuaGFwcm94 Oct 11 08:03:55 np0005481012 certmonger[38891]: eS9ucDAwMDU0ODEwMTIuc3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBNBgYrBgEF Oct 11 08:03:55 np0005481012 certmonger[38891]: AgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsHaGFwcm94eRsdbnAwMDA1 Oct 11 08:03:55 np0005481012 certmonger[38891]: NDgxMDEyLnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAGEsN8Tm Oct 11 08:03:55 np0005481012 certmonger[38891]: 2s3OhrSCPuQlr9edn+IY0dCmR9//u+Zn5kB1SvG22k9mypdYWSvz3Mo5nW+v4weE Oct 11 08:03:55 np0005481012 certmonger[38891]: HDxpRYtGltqlmzWQViajxu4xase9adtyI01bxzc97dV8M9VDewnawgPzDfHk9pbD Oct 11 08:03:55 np0005481012 certmonger[38891]: sHPVcDUFM81jXFEiiGcmuKw4ln+cKsqO5tears8e4k7Kmw/HsCL2io4idgUVE2+R Oct 11 08:03:55 np0005481012 certmonger[38891]: PtejRoM+LU0SWuVRAZ05OZmK/HLo4IEwzYQ0j6SCUb7/pYU/JXEQw0kuvb8Eniqe Oct 11 08:03:55 np0005481012 certmonger[38891]: 2effUHZBfdc0NjSj/8fy82ra/ymB1zfMRMbXYLuXsG69ZQmEksu9HJSCo7XH3r7I Oct 11 08:03:55 np0005481012 certmonger[38891]: TQbE5Sl8zcnhGOy0OrtObbmfaMnvWYSncJtcar2ZSzFE/6Bq6dJmiArgQO/FJwIq Oct 11 08:03:55 np0005481012 certmonger[38891]: mCAD6r4gYYTMEZ57c0PdSBdr8gy51ObboF9jfr2aj6sepJ+eukViCBV21ev/kSUn Oct 11 08:03:55 np0005481012 certmonger[38891]: Fd+26+egw9UjizCUlY1Tp0LQIR8pUyLm1BY49PHLNG8hHIrT5Aj3DgWjOA== Oct 11 08:03:55 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:03:55 np0005481012 certmonger[38891]: " Oct 11 08:03:55 np0005481012 certmonger[41059]: 2025-10-11 08:03:55 [41059] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:03:55 np0005481012 certmonger[41059]: MIIFZzCCA8+gAwIBAgIBLzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:55 np0005481012 certmonger[41059]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:55 np0005481012 certmonger[41059]: MDM1NFoXDTI3MTAxMjA4MDM1NFowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Oct 11 08:03:55 np0005481012 certmonger[41059]: BAMMHW5wMDAwNTQ4MTAxMi5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Oct 11 08:03:55 np0005481012 certmonger[41059]: AQEFAAOCAQ8AMIIBCgKCAQEAn6CKqSDHfkudl7029FFiJHPqhGG6Ev61mCMp6Bmv Oct 11 08:03:55 np0005481012 certmonger[41059]: FtHRoGkmMtvgAVQ8hfUZ9qaOCVYS0nR6bQfu8D8KDbCy1E6UjqwfU2pni+uW6bd6 Oct 11 08:03:55 np0005481012 certmonger[41059]: V1n8xVb+88YGQws+exHaj6xgci40IgMSBdQlfYJuxDvQACV3sre65F4qFp1qGc47 Oct 11 08:03:55 np0005481012 certmonger[41059]: QYB755r7Ut78iYG4ydafEODFzoMnWieR0DhDrxLgI9Qxfy2TUXZ/7ggcFwo+AsR+ Oct 11 08:03:55 np0005481012 certmonger[41059]: Qqz+9Ux6wWIL4EPGkqfnbevEuxVNqSdQH1dmV+WDUduWEb/dT2T1WlBCR28koTXf Oct 11 08:03:55 np0005481012 certmonger[41059]: 4RTHlmGW3lMnVErcqOybU9ABF26aybyrb86VlScJTYhXfQIDAQABo4IB/DCCAfgw Oct 11 08:03:55 np0005481012 certmonger[41059]: HwYDVR0jBBgwFoAUpmo3qgn1Gyf8p8PaklOw1w0+KGkwOgYIKwYBBQUHAQEELjAs Oct 11 08:03:55 np0005481012 certmonger[41059]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Oct 11 08:03:55 np0005481012 certmonger[41059]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Oct 11 08:03:55 np0005481012 certmonger[41059]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Oct 11 08:03:55 np0005481012 certmonger[41059]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Oct 11 08:03:55 np0005481012 certmonger[41059]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUUILUZH50erUsf5+lj6t4hc6TgIkw Oct 11 08:03:55 np0005481012 certmonger[41059]: gdUGA1UdEQSBzTCByoIdbnAwMDA1NDgxMDEyLnN0b3JhZ2Uub29vLnRlc3SCGm92 Oct 11 08:03:55 np0005481012 certmonger[41059]: ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQBgjcUAgOgMAwuaGFwcm94 Oct 11 08:03:55 np0005481012 certmonger[41059]: eS9ucDAwMDU0ODEwMTIuc3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBNBgYrBgEF Oct 11 08:03:55 np0005481012 certmonger[41059]: AgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsHaGFwcm94eRsdbnAwMDA1 Oct 11 08:03:55 np0005481012 certmonger[41059]: NDgxMDEyLnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAGEsN8Tm Oct 11 08:03:55 np0005481012 certmonger[41059]: 2s3OhrSCPuQlr9edn+IY0dCmR9//u+Zn5kB1SvG22k9mypdYWSvz3Mo5nW+v4weE Oct 11 08:03:55 np0005481012 certmonger[41059]: HDxpRYtGltqlmzWQViajxu4xase9adtyI01bxzc97dV8M9VDewnawgPzDfHk9pbD Oct 11 08:03:55 np0005481012 certmonger[41059]: sHPVcDUFM81jXFEiiGcmuKw4ln+cKsqO5tears8e4k7Kmw/HsCL2io4idgUVE2+R Oct 11 08:03:55 np0005481012 certmonger[41059]: PtejRoM+LU0SWuVRAZ05OZmK/HLo4IEwzYQ0j6SCUb7/pYU/JXEQw0kuvb8Eniqe Oct 11 08:03:55 np0005481012 certmonger[41059]: 2effUHZBfdc0NjSj/8fy82ra/ymB1zfMRMbXYLuXsG69ZQmEksu9HJSCo7XH3r7I Oct 11 08:03:55 np0005481012 certmonger[41059]: TQbE5Sl8zcnhGOy0OrtObbmfaMnvWYSncJtcar2ZSzFE/6Bq6dJmiArgQO/FJwIq Oct 11 08:03:55 np0005481012 certmonger[41059]: mCAD6r4gYYTMEZ57c0PdSBdr8gy51ObboF9jfr2aj6sepJ+eukViCBV21ev/kSUn Oct 11 08:03:55 np0005481012 certmonger[41059]: Fd+26+egw9UjizCUlY1Tp0LQIR8pUyLm1BY49PHLNG8hHIrT5Aj3DgWjOA== Oct 11 08:03:55 np0005481012 certmonger[41059]: -----END CERTIFICATE----- Oct 11 08:03:55 np0005481012 certmonger[41059]: ". Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Certificate submission still ongoing. Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Certificate submission postprocessing complete. Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Child status = 0. Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Child output: Oct 11 08:03:55 np0005481012 certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nFd+26+egw9UjizCUlY1Tp0LQIR8pUyLm1BY49PHLNG8hHIrT5Aj3DgWjOA==\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:03:55 np0005481012 certmonger[38891]: " Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:03:55 np0005481012 certmonger[38891]: MIIFZzCCA8+gAwIBAgIBLzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:55 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:55 np0005481012 certmonger[38891]: MDM1NFoXDTI3MTAxMjA4MDM1NFowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Oct 11 08:03:55 np0005481012 certmonger[38891]: BAMMHW5wMDAwNTQ4MTAxMi5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Oct 11 08:03:55 np0005481012 certmonger[38891]: AQEFAAOCAQ8AMIIBCgKCAQEAn6CKqSDHfkudl7029FFiJHPqhGG6Ev61mCMp6Bmv Oct 11 08:03:55 np0005481012 certmonger[38891]: FtHRoGkmMtvgAVQ8hfUZ9qaOCVYS0nR6bQfu8D8KDbCy1E6UjqwfU2pni+uW6bd6 Oct 11 08:03:55 np0005481012 certmonger[38891]: V1n8xVb+88YGQws+exHaj6xgci40IgMSBdQlfYJuxDvQACV3sre65F4qFp1qGc47 Oct 11 08:03:55 np0005481012 certmonger[38891]: QYB755r7Ut78iYG4ydafEODFzoMnWieR0DhDrxLgI9Qxfy2TUXZ/7ggcFwo+AsR+ Oct 11 08:03:55 np0005481012 certmonger[38891]: Qqz+9Ux6wWIL4EPGkqfnbevEuxVNqSdQH1dmV+WDUduWEb/dT2T1WlBCR28koTXf Oct 11 08:03:55 np0005481012 certmonger[38891]: 4RTHlmGW3lMnVErcqOybU9ABF26aybyrb86VlScJTYhXfQIDAQABo4IB/DCCAfgw Oct 11 08:03:55 np0005481012 certmonger[38891]: HwYDVR0jBBgwFoAUpmo3qgn1Gyf8p8PaklOw1w0+KGkwOgYIKwYBBQUHAQEELjAs Oct 11 08:03:55 np0005481012 certmonger[38891]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Oct 11 08:03:55 np0005481012 certmonger[38891]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Oct 11 08:03:55 np0005481012 certmonger[38891]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Oct 11 08:03:55 np0005481012 certmonger[38891]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Oct 11 08:03:55 np0005481012 certmonger[38891]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUUILUZH50erUsf5+lj6t4hc6TgIkw Oct 11 08:03:55 np0005481012 certmonger[38891]: gdUGA1UdEQSBzTCByoIdbnAwMDA1NDgxMDEyLnN0b3JhZ2Uub29vLnRlc3SCGm92 Oct 11 08:03:55 np0005481012 certmonger[38891]: ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQBgjcUAgOgMAwuaGFwcm94 Oct 11 08:03:55 np0005481012 certmonger[38891]: eS9ucDAwMDU0ODEwMTIuc3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBNBgYrBgEF Oct 11 08:03:55 np0005481012 certmonger[38891]: AgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsHaGFwcm94eRsdbnAwMDA1 Oct 11 08:03:55 np0005481012 certmonger[38891]: NDgxMDEyLnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAGEsN8Tm Oct 11 08:03:55 np0005481012 certmonger[38891]: 2s3OhrSCPuQlr9edn+IY0dCmR9//u+Zn5kB1SvG22k9mypdYWSvz3Mo5nW+v4weE Oct 11 08:03:55 np0005481012 certmonger[38891]: HDxpRYtGltqlmzWQViajxu4xase9adtyI01bxzc97dV8M9VDewnawgPzDfHk9pbD Oct 11 08:03:55 np0005481012 certmonger[38891]: sHPVcDUFM81jXFEiiGcmuKw4ln+cKsqO5tears8e4k7Kmw/HsCL2io4idgUVE2+R Oct 11 08:03:55 np0005481012 certmonger[38891]: PtejRoM+LU0SWuVRAZ05OZmK/HLo4IEwzYQ0j6SCUb7/pYU/JXEQw0kuvb8Eniqe Oct 11 08:03:55 np0005481012 certmonger[38891]: 2effUHZBfdc0NjSj/8fy82ra/ymB1zfMRMbXYLuXsG69ZQmEksu9HJSCo7XH3r7I Oct 11 08:03:55 np0005481012 certmonger[38891]: TQbE5Sl8zcnhGOy0OrtObbmfaMnvWYSncJtcar2ZSzFE/6Bq6dJmiArgQO/FJwIq Oct 11 08:03:55 np0005481012 certmonger[38891]: mCAD6r4gYYTMEZ57c0PdSBdr8gy51ObboF9jfr2aj6sepJ+eukViCBV21ev/kSUn Oct 11 08:03:55 np0005481012 certmonger[38891]: Fd+26+egw9UjizCUlY1Tp0LQIR8pUyLm1BY49PHLNG8hHIrT5Aj3DgWjOA== Oct 11 08:03:55 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:03:55 np0005481012 certmonger[38891]: ". Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] No hooks set for pre-save command. Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:55 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:55 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:55 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:55 np0005481012 certmonger[41126]: Certificate in file "/etc/pki/tls/certs/haproxy-storage-cert.crt" issued by CA and saved. Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:55 np0005481012 certmonger[38891]: 2025-10-11 08:03:55 [38891] Wrote to /var/lib/certmonger/requests/20251011080354 Oct 11 08:03:56 np0005481012 python3[41142]: ansible-certificate_request Invoked with name=haproxy-storage_mgmt-cert dns=['np0005481012.storagemgmt.ooo.test', 'overcloud.storagemgmt.ooo.test'] principal=['haproxy/np0005481012.storagemgmt.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-storage_mgmt-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.crt"#012cp "/etc/pki/tls/private/haproxy-storage_mgmt-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-storage_mgmt.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-storage_mgmt.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[41152]: 2025-10-11 08:03:56 [41152] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481012.storagemgmt.ooo.test" for child. Oct 11 08:03:56 np0005481012 certmonger[41152]: 2025-10-11 08:03:56 [41152] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481012.storagemgmt.ooo.test Oct 11 08:03:56 np0005481012 certmonger[41152]: overcloud.storagemgmt.ooo.test Oct 11 08:03:56 np0005481012 certmonger[41152]: " for child. Oct 11 08:03:56 np0005481012 certmonger[41152]: 2025-10-11 08:03:56 [41152] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005481012.storagemgmt.ooo.test@OOO.TEST Oct 11 08:03:56 np0005481012 certmonger[41152]: " for child. Oct 11 08:03:56 np0005481012 certmonger[41152]: 2025-10-11 08:03:56 [41152] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:03:56 np0005481012 certmonger[41152]: 2025-10-11 08:03:56 [41152] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:03:56 np0005481012 certmonger[41152]: MIID+DCCAuACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDEyLnN0b3JhZ2VtZ210 Oct 11 08:03:56 np0005481012 certmonger[41152]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyWp4a6c0 Oct 11 08:03:56 np0005481012 certmonger[41152]: fGKUwOYx3xcBFDbH/xtVj0h+IumIGzOPH8MJuic/1R0REOlWjC/wR5HDqYT+OA7L Oct 11 08:03:56 np0005481012 certmonger[41152]: cfmn/PnlanWDb22QHtw7f7vH6LzssjkWKlfbVz2xxgGConCXwJ45GMea6fYYPQll Oct 11 08:03:56 np0005481012 certmonger[41152]: V7UcBHTaY5AKmyUl3bRb7qe21SUYh+w6+tjV1r52QRZKjDXCn+Wx/33xKVaLOAhQ Oct 11 08:03:56 np0005481012 certmonger[41152]: PP6GcWtslmqXSZv1m/Po4QFOoCB7xvPeuTGNJifB9reaOGsrqyM2uQNJcceSBjy5 Oct 11 08:03:56 np0005481012 certmonger[41152]: kf7cCeMe1cjylU2LxU06kRzVMCjNDpkxzZJkPypG+IrGhz0C5PyMwgf6FoprQ40i Oct 11 08:03:56 np0005481012 certmonger[41152]: p1hUa/6F8TeWawIDAQABoIIBhTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:03:56 np0005481012 certmonger[41152]: ADEAMQAwADgAMAAzADUANjCCAVQGCSqGSIb3DQEJDjGCAUUwggFBMAsGA1UdDwQE Oct 11 08:03:56 np0005481012 certmonger[41152]: AwIFoDCB5QYDVR0RBIHdMIHagiFucDAwMDU0ODEwMTIuc3RvcmFnZW1nbXQub29v Oct 11 08:03:56 np0005481012 certmonger[41152]: LnRlc3SCHm92ZXJjbG91ZC5zdG9yYWdlbWdtdC5vb28udGVzdKBCBgorBgEEAYI3 Oct 11 08:03:56 np0005481012 certmonger[41152]: FAIDoDQMMmhhcHJveHkvbnAwMDA1NDgxMDEyLnN0b3JhZ2VtZ210Lm9vby50ZXN0 Oct 11 08:03:56 np0005481012 certmonger[41152]: QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAs Oct 11 08:03:56 np0005481012 certmonger[41152]: GwdoYXByb3h5GyFucDAwMDU0ODEwMTIuc3RvcmFnZW1nbXQub29vLnRlc3QwHQYD Oct 11 08:03:56 np0005481012 certmonger[41152]: VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O Oct 11 08:03:56 np0005481012 certmonger[41152]: BBYEFFalySXOTg5kA+vjaQCt6LMy3R02MA0GCSqGSIb3DQEBCwUAA4IBAQCgHn1E Oct 11 08:03:56 np0005481012 certmonger[41152]: CNw5pcXwMEPQ19qOxeI6FrzRqncNThCN784RSF8ywEa8wl8pih7ZQxATXgYoxDmm Oct 11 08:03:56 np0005481012 certmonger[41152]: GQ2yAkU+AqMRIG7HyZPsBDOIflLQUnbBKmiZAY4Fw8p8ha0CozIDIddZkxdOMvEO Oct 11 08:03:56 np0005481012 certmonger[41152]: 8oKoJWP4HI3yP5Le36NbacpXPd/RETR9AeToKPGSs534kkPkayL07zHMpTL+uAgQ Oct 11 08:03:56 np0005481012 certmonger[41152]: RkiTjSIkfjJOpPcQgXwrxCN2dmUvp7ujWyXG3jc29D1sZL+7ffOznVo/QjkegcJX Oct 11 08:03:56 np0005481012 certmonger[41152]: ONEqjp5oQPB3wRZcHsmeOIu+mha0aKx+88LJ/V/fX7Tup5elPYcFwZqI4nhfGrOb Oct 11 08:03:56 np0005481012 certmonger[41152]: diA+Mpj1L9cwXPgU Oct 11 08:03:56 np0005481012 certmonger[41152]: -----END CERTIFICATE REQUEST----- Oct 11 08:03:56 np0005481012 certmonger[41152]: " for child. Oct 11 08:03:56 np0005481012 certmonger[41152]: 2025-10-11 08:03:56 [41152] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJanhrpzR8YpTA5jHfFwEUNsf/G1WPSH4i6YgbM48fwwm6Jz/VHREQ6VaML/BHkcOphP44Dstx+af8+eVqdYNvbZAe3Dt/u8fovOyyORYqV9tXPbHGAYKicJfAnjkYx5rp9hg9CWVXtRwEdNpjkAqbJSXdtFvup7bVJRiH7Dr62NXWvnZBFkqMNcKf5bH/ffEpVos4CFA8/oZxa2yWapdJm/Wb8+jhAU6gIHvG8965MY0mJ8H2t5o4ayurIza5A0lxx5IGPLmR/twJ4x7VyPKVTYvFTTqRHNUwKM0OmTHNkmQ/Kkb4isaHPQLk/IzCB/oWimtDjSKnWFRr/oXxN5ZrAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAJ7sHq9jwcrfkkZguOZLHAQNfg3DWVrGrs/i7+UOeigJF3IpRB/mec8yRqAmiEGTKIQRBSxS/Ou5bFkSjPtBslPt9rLL29iVZlKrYKeAa0lmWPF61COemKcbtrK99Nk2UvffZaQ4wA5IwMbJ5nu7n91cNSzhoWqX3K2dM/VNjr7ZEGnALAqruEXdvToZiMMyea6D6k423L++PLe33Sa+V6TKAQHyhDpOmOcHljY3PMDcUDESytf7T5YgSwuKpT4p8UIWjUpzYGrj+Nx8m7pBu5JVXbvtwQiF2nxL28gv5NW7khmIh+3wr0m+Clflm7oobOZBePu4b44j46P5t/0KXyQ==" for child. Oct 11 08:03:56 np0005481012 certmonger[41152]: 2025-10-11 08:03:56 [41152] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyWp4a6c0fGKUwOYx3xcBFDbH/xtVj0h+IumIGzOPH8MJuic/1R0REOlWjC/wR5HDqYT+OA7Lcfmn/PnlanWDb22QHtw7f7vH6LzssjkWKlfbVz2xxgGConCXwJ45GMea6fYYPQllV7UcBHTaY5AKmyUl3bRb7qe21SUYh+w6+tjV1r52QRZKjDXCn+Wx/33xKVaLOAhQPP6GcWtslmqXSZv1m/Po4QFOoCB7xvPeuTGNJifB9reaOGsrqyM2uQNJcceSBjy5kf7cCeMe1cjylU2LxU06kRzVMCjNDpkxzZJkPypG+IrGhz0C5PyMwgf6FoprQ40ip1hUa/6F8TeWawIDAQAB" for child. Oct 11 08:03:56 np0005481012 certmonger[41152]: 2025-10-11 08:03:56 [41152] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:03:56 np0005481012 certmonger[41152]: 2025-10-11 08:03:56 [41152] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:03:56 np0005481012 certmonger[41152]: 2025-10-11 08:03:56 [41152] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:03:56 np0005481012 certmonger[41152]: 2025-10-11 08:03:56 [41152] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:03:56 np0005481012 certmonger[41152]: 2025-10-11 08:03:56 [41152] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[41152]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:03:56 np0005481012 certmonger[41152]: Certificate: "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" Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Certificate submission still ongoing. Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Certificate submission attempt complete. Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Child status = 0. Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Child output: Oct 11 08:03:56 np0005481012 certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 08:03:56 np0005481012 certmonger[38891]: MIIFezCCA+OgAwIBAgIBMjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:56 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:56 np0005481012 certmonger[38891]: MDM1NloXDTI3MTAxMjA4MDM1NlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:03:56 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:03:56 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAMlqeGunNHxilMDmMd8XARQ2x/8bVY9IfiLp Oct 11 08:03:56 np0005481012 certmonger[38891]: iBszjx/DCbonP9UdERDpVowv8EeRw6mE/jgOy3H5p/z55Wp1g29tkB7cO3+7x+i8 Oct 11 08:03:56 np0005481012 certmonger[38891]: 7LI5FipX21c9scYBgqJwl8CeORjHmun2GD0JZVe1HAR02mOQCpslJd20W+6nttUl Oct 11 08:03:56 np0005481012 certmonger[38891]: GIfsOvrY1da+dkEWSow1wp/lsf998SlWizgIUDz+hnFrbJZql0mb9Zvz6OEBTqAg Oct 11 08:03:56 np0005481012 certmonger[38891]: e8bz3rkxjSYnwfa3mjhrK6sjNrkDSXHHkgY8uZH+3AnjHtXI8pVNi8VNOpEc1TAo Oct 11 08:03:56 np0005481012 certmonger[38891]: zQ6ZMc2SZD8qRviKxoc9AuT8jMIH+haKa0ONIqdYVGv+hfE3lmsCAwEAAaOCAgww Oct 11 08:03:56 np0005481012 certmonger[38891]: ggIIMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:03:56 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:03:56 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:03:56 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:03:56 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:03:56 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFO4THOXySTdHv88w91akPEul Oct 11 08:03:56 np0005481012 certmonger[38891]: QS+RMIHlBgNVHREEgd0wgdqCIW5wMDAwNTQ4MTAxMi5zdG9yYWdlbWdtdC5vb28u Oct 11 08:03:56 np0005481012 certmonger[38891]: dGVzdIIeb3ZlcmNsb3VkLnN0b3JhZ2VtZ210Lm9vby50ZXN0oEIGCisGAQQBgjcU Oct 11 08:03:56 np0005481012 certmonger[38891]: AgOgNAwyaGFwcm94eS9ucDAwMDU0ODEwMTIuc3RvcmFnZW1nbXQub29vLnRlc3RA Oct 11 08:03:56 np0005481012 certmonger[38891]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Oct 11 08:03:56 np0005481012 certmonger[38891]: B2hhcHJveHkbIW5wMDAwNTQ4MTAxMi5zdG9yYWdlbWdtdC5vb28udGVzdDANBgkq Oct 11 08:03:56 np0005481012 certmonger[38891]: hkiG9w0BAQsFAAOCAYEAHyIozMtrjtM3O20kruvVmwDSEOeHS3fzG9Nb6BjIC3ot Oct 11 08:03:56 np0005481012 certmonger[38891]: +9i4uXqQxsboVsHm59AGSS9yVBTjad+MDIVjSUivFlxbHD3wp+crS6fTX4rhhcYV Oct 11 08:03:56 np0005481012 certmonger[38891]: /3EGbgoG4A2JzFjIU0M7aNZovcylSbS7wZ+ZL6VNC1ro6NVpbnsIl5xDgfPqdTNY Oct 11 08:03:56 np0005481012 certmonger[38891]: oWKGwwxzO9YpuNbd0xHaVd9dql3+5LA/euZ1p11D9AW5D3rzsXCxzdnhuMNNcmhn Oct 11 08:03:56 np0005481012 certmonger[38891]: wUqsiFcl7lA/thQiXYJqBOfYwcd5Tb873D+C6KKzS/vZWbchQsANrqdeQUR2u7/7 Oct 11 08:03:56 np0005481012 certmonger[38891]: PulZghzm7PIDRPzHAlwuIyndJ6PYNbz+GRfB42m8vM04CLfp2T/rsE5SVBamlB9M Oct 11 08:03:56 np0005481012 certmonger[38891]: gHdzrGge+VXXUvLor0XeYRXqYkqMvxgzHXGktgv0V/5lpYlDyuiGBT653tHi6Hjb Oct 11 08:03:56 np0005481012 certmonger[38891]: 23qe6XaYB8nOQ7WZ6qrd5/UiAnobs3PhHDVqc8OOIEbj832iUQj6ZakfpEBihh1u Oct 11 08:03:56 np0005481012 certmonger[38891]: iiPI2hv1G0JFqGkQ69j7 Oct 11 08:03:56 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:03:56 np0005481012 certmonger[38891]: " Oct 11 08:03:56 np0005481012 certmonger[41154]: 2025-10-11 08:03:56 [41154] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:03:56 np0005481012 certmonger[41154]: MIIFezCCA+OgAwIBAgIBMjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:56 np0005481012 certmonger[41154]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:56 np0005481012 certmonger[41154]: MDM1NloXDTI3MTAxMjA4MDM1NlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:03:56 np0005481012 certmonger[41154]: BAMMIW5wMDAwNTQ4MTAxMi5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:03:56 np0005481012 certmonger[41154]: hvcNAQEBBQADggEPADCCAQoCggEBAMlqeGunNHxilMDmMd8XARQ2x/8bVY9IfiLp Oct 11 08:03:56 np0005481012 certmonger[41154]: iBszjx/DCbonP9UdERDpVowv8EeRw6mE/jgOy3H5p/z55Wp1g29tkB7cO3+7x+i8 Oct 11 08:03:56 np0005481012 certmonger[41154]: 7LI5FipX21c9scYBgqJwl8CeORjHmun2GD0JZVe1HAR02mOQCpslJd20W+6nttUl Oct 11 08:03:56 np0005481012 certmonger[41154]: GIfsOvrY1da+dkEWSow1wp/lsf998SlWizgIUDz+hnFrbJZql0mb9Zvz6OEBTqAg Oct 11 08:03:56 np0005481012 certmonger[41154]: e8bz3rkxjSYnwfa3mjhrK6sjNrkDSXHHkgY8uZH+3AnjHtXI8pVNi8VNOpEc1TAo Oct 11 08:03:56 np0005481012 certmonger[41154]: zQ6ZMc2SZD8qRviKxoc9AuT8jMIH+haKa0ONIqdYVGv+hfE3lmsCAwEAAaOCAgww Oct 11 08:03:56 np0005481012 certmonger[41154]: ggIIMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:03:56 np0005481012 certmonger[41154]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:03:56 np0005481012 certmonger[41154]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:03:56 np0005481012 certmonger[41154]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:03:56 np0005481012 certmonger[41154]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:03:56 np0005481012 certmonger[41154]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFO4THOXySTdHv88w91akPEul Oct 11 08:03:56 np0005481012 certmonger[41154]: QS+RMIHlBgNVHREEgd0wgdqCIW5wMDAwNTQ4MTAxMi5zdG9yYWdlbWdtdC5vb28u Oct 11 08:03:56 np0005481012 certmonger[41154]: dGVzdIIeb3ZlcmNsb3VkLnN0b3JhZ2VtZ210Lm9vby50ZXN0oEIGCisGAQQBgjcU Oct 11 08:03:56 np0005481012 certmonger[41154]: AgOgNAwyaGFwcm94eS9ucDAwMDU0ODEwMTIuc3RvcmFnZW1nbXQub29vLnRlc3RA Oct 11 08:03:56 np0005481012 certmonger[41154]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Oct 11 08:03:56 np0005481012 certmonger[41154]: B2hhcHJveHkbIW5wMDAwNTQ4MTAxMi5zdG9yYWdlbWdtdC5vb28udGVzdDANBgkq Oct 11 08:03:56 np0005481012 certmonger[41154]: hkiG9w0BAQsFAAOCAYEAHyIozMtrjtM3O20kruvVmwDSEOeHS3fzG9Nb6BjIC3ot Oct 11 08:03:56 np0005481012 certmonger[41154]: +9i4uXqQxsboVsHm59AGSS9yVBTjad+MDIVjSUivFlxbHD3wp+crS6fTX4rhhcYV Oct 11 08:03:56 np0005481012 certmonger[41154]: /3EGbgoG4A2JzFjIU0M7aNZovcylSbS7wZ+ZL6VNC1ro6NVpbnsIl5xDgfPqdTNY Oct 11 08:03:56 np0005481012 certmonger[41154]: oWKGwwxzO9YpuNbd0xHaVd9dql3+5LA/euZ1p11D9AW5D3rzsXCxzdnhuMNNcmhn Oct 11 08:03:56 np0005481012 certmonger[41154]: wUqsiFcl7lA/thQiXYJqBOfYwcd5Tb873D+C6KKzS/vZWbchQsANrqdeQUR2u7/7 Oct 11 08:03:56 np0005481012 certmonger[41154]: PulZghzm7PIDRPzHAlwuIyndJ6PYNbz+GRfB42m8vM04CLfp2T/rsE5SVBamlB9M Oct 11 08:03:56 np0005481012 certmonger[41154]: gHdzrGge+VXXUvLor0XeYRXqYkqMvxgzHXGktgv0V/5lpYlDyuiGBT653tHi6Hjb Oct 11 08:03:56 np0005481012 certmonger[41154]: 23qe6XaYB8nOQ7WZ6qrd5/UiAnobs3PhHDVqc8OOIEbj832iUQj6ZakfpEBihh1u Oct 11 08:03:56 np0005481012 certmonger[41154]: iiPI2hv1G0JFqGkQ69j7 Oct 11 08:03:56 np0005481012 certmonger[41154]: -----END CERTIFICATE----- Oct 11 08:03:56 np0005481012 certmonger[41154]: ". Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Certificate submission still ongoing. Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Certificate submission postprocessing complete. Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Child status = 0. Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Child output: Oct 11 08:03:56 np0005481012 certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----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\niiPI2hv1G0JFqGkQ69j7\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:03:56 np0005481012 certmonger[38891]: " Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:03:56 np0005481012 certmonger[38891]: MIIFezCCA+OgAwIBAgIBMjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:56 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:56 np0005481012 certmonger[38891]: MDM1NloXDTI3MTAxMjA4MDM1NlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:03:56 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:03:56 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAMlqeGunNHxilMDmMd8XARQ2x/8bVY9IfiLp Oct 11 08:03:56 np0005481012 certmonger[38891]: iBszjx/DCbonP9UdERDpVowv8EeRw6mE/jgOy3H5p/z55Wp1g29tkB7cO3+7x+i8 Oct 11 08:03:56 np0005481012 certmonger[38891]: 7LI5FipX21c9scYBgqJwl8CeORjHmun2GD0JZVe1HAR02mOQCpslJd20W+6nttUl Oct 11 08:03:56 np0005481012 certmonger[38891]: GIfsOvrY1da+dkEWSow1wp/lsf998SlWizgIUDz+hnFrbJZql0mb9Zvz6OEBTqAg Oct 11 08:03:56 np0005481012 certmonger[38891]: e8bz3rkxjSYnwfa3mjhrK6sjNrkDSXHHkgY8uZH+3AnjHtXI8pVNi8VNOpEc1TAo Oct 11 08:03:56 np0005481012 certmonger[38891]: zQ6ZMc2SZD8qRviKxoc9AuT8jMIH+haKa0ONIqdYVGv+hfE3lmsCAwEAAaOCAgww Oct 11 08:03:56 np0005481012 certmonger[38891]: ggIIMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:03:56 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:03:56 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:03:56 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:03:56 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:03:56 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFO4THOXySTdHv88w91akPEul Oct 11 08:03:56 np0005481012 certmonger[38891]: QS+RMIHlBgNVHREEgd0wgdqCIW5wMDAwNTQ4MTAxMi5zdG9yYWdlbWdtdC5vb28u Oct 11 08:03:56 np0005481012 certmonger[38891]: dGVzdIIeb3ZlcmNsb3VkLnN0b3JhZ2VtZ210Lm9vby50ZXN0oEIGCisGAQQBgjcU Oct 11 08:03:56 np0005481012 certmonger[38891]: AgOgNAwyaGFwcm94eS9ucDAwMDU0ODEwMTIuc3RvcmFnZW1nbXQub29vLnRlc3RA Oct 11 08:03:56 np0005481012 certmonger[38891]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Oct 11 08:03:56 np0005481012 certmonger[38891]: B2hhcHJveHkbIW5wMDAwNTQ4MTAxMi5zdG9yYWdlbWdtdC5vb28udGVzdDANBgkq Oct 11 08:03:56 np0005481012 certmonger[38891]: hkiG9w0BAQsFAAOCAYEAHyIozMtrjtM3O20kruvVmwDSEOeHS3fzG9Nb6BjIC3ot Oct 11 08:03:56 np0005481012 certmonger[38891]: +9i4uXqQxsboVsHm59AGSS9yVBTjad+MDIVjSUivFlxbHD3wp+crS6fTX4rhhcYV Oct 11 08:03:56 np0005481012 certmonger[38891]: /3EGbgoG4A2JzFjIU0M7aNZovcylSbS7wZ+ZL6VNC1ro6NVpbnsIl5xDgfPqdTNY Oct 11 08:03:56 np0005481012 certmonger[38891]: oWKGwwxzO9YpuNbd0xHaVd9dql3+5LA/euZ1p11D9AW5D3rzsXCxzdnhuMNNcmhn Oct 11 08:03:56 np0005481012 certmonger[38891]: wUqsiFcl7lA/thQiXYJqBOfYwcd5Tb873D+C6KKzS/vZWbchQsANrqdeQUR2u7/7 Oct 11 08:03:56 np0005481012 certmonger[38891]: PulZghzm7PIDRPzHAlwuIyndJ6PYNbz+GRfB42m8vM04CLfp2T/rsE5SVBamlB9M Oct 11 08:03:56 np0005481012 certmonger[38891]: gHdzrGge+VXXUvLor0XeYRXqYkqMvxgzHXGktgv0V/5lpYlDyuiGBT653tHi6Hjb Oct 11 08:03:56 np0005481012 certmonger[38891]: 23qe6XaYB8nOQ7WZ6qrd5/UiAnobs3PhHDVqc8OOIEbj832iUQj6ZakfpEBihh1u Oct 11 08:03:56 np0005481012 certmonger[38891]: iiPI2hv1G0JFqGkQ69j7 Oct 11 08:03:56 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:03:56 np0005481012 certmonger[38891]: ". Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] No hooks set for pre-save command. Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:56 np0005481012 certmonger[38891]: 2025-10-11 08:03:56 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:57 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:57 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:57 np0005481012 certmonger[38891]: 2025-10-11 08:03:57 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:57 np0005481012 certmonger[38891]: 2025-10-11 08:03:57 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:57 np0005481012 certmonger[41226]: Certificate in file "/etc/pki/tls/certs/haproxy-storage_mgmt-cert.crt" issued by CA and saved. Oct 11 08:03:57 np0005481012 certmonger[38891]: 2025-10-11 08:03:57 [38891] Wrote to /var/lib/certmonger/requests/20251011080356 Oct 11 08:03:57 np0005481012 python3[41243]: ansible-certificate_request Invoked with name=haproxy-internal_api-cert dns=['np0005481012.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['haproxy/np0005481012.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-internal_api-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.crt"#012cp "/etc/pki/tls/private/haproxy-internal_api-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-internal_api.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-internal_api.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:03:58 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[41253]: 2025-10-11 08:03:58 [41253] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481012.internalapi.ooo.test" for child. Oct 11 08:03:58 np0005481012 certmonger[41253]: 2025-10-11 08:03:58 [41253] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481012.internalapi.ooo.test Oct 11 08:03:58 np0005481012 certmonger[41253]: overcloud.internalapi.ooo.test Oct 11 08:03:58 np0005481012 certmonger[41253]: " for child. Oct 11 08:03:58 np0005481012 certmonger[41253]: 2025-10-11 08:03:58 [41253] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005481012.internalapi.ooo.test@OOO.TEST Oct 11 08:03:58 np0005481012 certmonger[41253]: " for child. Oct 11 08:03:58 np0005481012 certmonger[41253]: 2025-10-11 08:03:58 [41253] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:03:58 np0005481012 certmonger[41253]: 2025-10-11 08:03:58 [41253] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:03:58 np0005481012 certmonger[41253]: MIID+DCCAuACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDEyLmludGVybmFsYXBp Oct 11 08:03:58 np0005481012 certmonger[41253]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArN+rWbOp Oct 11 08:03:58 np0005481012 certmonger[41253]: 1bEHDnC2W70/SUq7KrESIbcB0UZMA/5Fy0CW3UKZ2AwzDz61WoamXXd3C6dyXiPu Oct 11 08:03:58 np0005481012 certmonger[41253]: 8BLBJwwZTu3sBdLMkBgSS5poldd9jmFIU9EjeUgHfL4bJjWvtN/DlITPIjMQZrpk Oct 11 08:03:58 np0005481012 certmonger[41253]: 8eYttRvoyNtDqHIdk+tCkbPEkkYuPSpPB11qWUNxToYoCbITL3yvGgcNfK0UGY5J Oct 11 08:03:58 np0005481012 certmonger[41253]: 00ATsIT/ehQy6+IrrwKq4fEYSUj4MTu7oxZt0GcS9uHqepWtEbXmhkIhD9Jyb4Jp Oct 11 08:03:58 np0005481012 certmonger[41253]: GKKkPt/NFdhBG0iOqCDIHrVaXzpluVc0LHwNxKTU3u+fezmuhT7fFohc0wGYywsz Oct 11 08:03:58 np0005481012 certmonger[41253]: 2L0EQggfo+CFhQIDAQABoIIBhTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:03:58 np0005481012 certmonger[41253]: ADEAMQAwADgAMAAzADUAODCCAVQGCSqGSIb3DQEJDjGCAUUwggFBMAsGA1UdDwQE Oct 11 08:03:58 np0005481012 certmonger[41253]: AwIFoDCB5QYDVR0RBIHdMIHagiFucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29v Oct 11 08:03:58 np0005481012 certmonger[41253]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBCBgorBgEEAYI3 Oct 11 08:03:58 np0005481012 certmonger[41253]: FAIDoDQMMmhhcHJveHkvbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0 Oct 11 08:03:58 np0005481012 certmonger[41253]: QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAs Oct 11 08:03:58 np0005481012 certmonger[41253]: GwdoYXByb3h5GyFucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29vLnRlc3QwHQYD Oct 11 08:03:58 np0005481012 certmonger[41253]: VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O Oct 11 08:03:58 np0005481012 certmonger[41253]: BBYEFCcWCyO93AzAQGZ/9XwOMqUdOaDUMA0GCSqGSIb3DQEBCwUAA4IBAQAQOcwk Oct 11 08:03:58 np0005481012 certmonger[41253]: 0IhSXxZ4M+rexdMGInStjiDGc7LDk6Zv3kySOJ57FGOptxQ3E92oXekzg1hAcwtz Oct 11 08:03:58 np0005481012 certmonger[41253]: j+CvjN2+sempfOYznSmRCix1Cf6CxLhUPpPxum9IdhDSNFzoknyYojykPxlVAB5W Oct 11 08:03:58 np0005481012 certmonger[41253]: p9Yj8HzR7SJBC4R190Le3f+lyR1QRrlB4GElHTM1peZp3xKRoC6dmSWsz5GXjpxH Oct 11 08:03:58 np0005481012 certmonger[41253]: QtrQF2vXZwEN4vYObmDfZ6sX7Bpo94i6FQHzfWoqF7yvdht4uu+13m1TVDXuo7Op Oct 11 08:03:58 np0005481012 certmonger[41253]: WArWxzgKTvMwj0WHxPOiQPSFScLE8e/uAiTuL9uUc9W/6tB4OHx9DR/OzUVzgaed Oct 11 08:03:58 np0005481012 certmonger[41253]: vorsVUx6xO4o25RZ Oct 11 08:03:58 np0005481012 certmonger[41253]: -----END CERTIFICATE REQUEST----- Oct 11 08:03:58 np0005481012 certmonger[41253]: " for child. Oct 11 08:03:58 np0005481012 certmonger[41253]: 2025-10-11 08:03:58 [41253] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:03:58 np0005481012 certmonger[41253]: 2025-10-11 08:03:58 [41253] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArN+rWbOp1bEHDnC2W70/SUq7KrESIbcB0UZMA/5Fy0CW3UKZ2AwzDz61WoamXXd3C6dyXiPu8BLBJwwZTu3sBdLMkBgSS5poldd9jmFIU9EjeUgHfL4bJjWvtN/DlITPIjMQZrpk8eYttRvoyNtDqHIdk+tCkbPEkkYuPSpPB11qWUNxToYoCbITL3yvGgcNfK0UGY5J00ATsIT/ehQy6+IrrwKq4fEYSUj4MTu7oxZt0GcS9uHqepWtEbXmhkIhD9Jyb4JpGKKkPt/NFdhBG0iOqCDIHrVaXzpluVc0LHwNxKTU3u+fezmuhT7fFohc0wGYywsz2L0EQggfo+CFhQIDAQAB" for child. Oct 11 08:03:58 np0005481012 certmonger[41253]: 2025-10-11 08:03:58 [41253] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:03:58 np0005481012 certmonger[41253]: 2025-10-11 08:03:58 [41253] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:03:58 np0005481012 certmonger[41253]: 2025-10-11 08:03:58 [41253] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:03:58 np0005481012 certmonger[41253]: 2025-10-11 08:03:58 [41253] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:03:58 np0005481012 certmonger[41253]: 2025-10-11 08:03:58 [41253] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[41253]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:03:58 np0005481012 certmonger[41253]: Certificate: "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" Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Certificate submission still ongoing. Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Certificate submission attempt complete. Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Child status = 0. Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Child output: Oct 11 08:03:58 np0005481012 certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 08:03:58 np0005481012 certmonger[38891]: MIIFezCCA+OgAwIBAgIBNDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:58 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:58 np0005481012 certmonger[38891]: MDM1OFoXDTI3MTAxMjA4MDM1OFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:03:58 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:03:58 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAKzfq1mzqdWxBw5wtlu9P0lKuyqxEiG3AdFG Oct 11 08:03:58 np0005481012 certmonger[38891]: TAP+RctAlt1CmdgMMw8+tVqGpl13dwuncl4j7vASwScMGU7t7AXSzJAYEkuaaJXX Oct 11 08:03:58 np0005481012 certmonger[38891]: fY5hSFPRI3lIB3y+GyY1r7Tfw5SEzyIzEGa6ZPHmLbUb6MjbQ6hyHZPrQpGzxJJG Oct 11 08:03:58 np0005481012 certmonger[38891]: Lj0qTwddallDcU6GKAmyEy98rxoHDXytFBmOSdNAE7CE/3oUMuviK68CquHxGElI Oct 11 08:03:58 np0005481012 certmonger[38891]: +DE7u6MWbdBnEvbh6nqVrRG15oZCIQ/Scm+CaRiipD7fzRXYQRtIjqggyB61Wl86 Oct 11 08:03:58 np0005481012 certmonger[38891]: ZblXNCx8DcSk1N7vn3s5roU+3xaIXNMBmMsLM9i9BEIIH6PghYUCAwEAAaOCAgww Oct 11 08:03:58 np0005481012 certmonger[38891]: ggIIMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:03:58 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:03:58 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:03:58 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:03:58 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:03:58 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCksoKjbZCBb5DwWLkOmmQaN Oct 11 08:03:58 np0005481012 certmonger[38891]: RFL+MIHlBgNVHREEgd0wgdqCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:03:58 np0005481012 certmonger[38891]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEIGCisGAQQBgjcU Oct 11 08:03:58 np0005481012 certmonger[38891]: AgOgNAwyaGFwcm94eS9ucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29vLnRlc3RA Oct 11 08:03:58 np0005481012 certmonger[38891]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Oct 11 08:03:58 np0005481012 certmonger[38891]: B2hhcHJveHkbIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkq Oct 11 08:03:58 np0005481012 certmonger[38891]: hkiG9w0BAQsFAAOCAYEAgCcxPofotZAJKGNYpIrSkoArBFRf2A+q4AKaXV0zCk1g Oct 11 08:03:58 np0005481012 certmonger[38891]: IG+KTCwMYwuWUxTvPfDRWx5Q7MR1fQXNX/DXw3vrYtB0Ho8I+BYouTDJ/40LeODo Oct 11 08:03:58 np0005481012 certmonger[38891]: 5NsgGskj6EDusc2fSBbch+8acEouEouo8VHyYuornfSczUspjinKFtuR5D8o5774 Oct 11 08:03:58 np0005481012 certmonger[38891]: KnV8jji1UcL29IXArGafvqy8qglmRZNHXeZMv467ph5S2MLNhD/Lk59blNuOo+PZ Oct 11 08:03:58 np0005481012 certmonger[38891]: ZStRrnLVSUq2k8lQnI7G9bAQQMrRQi3/zSZ1DLUf6r40LqUAhbfEBoRImcsQGLws Oct 11 08:03:58 np0005481012 certmonger[38891]: F5ZfPewQRgG5Encwae/iLpNDuST6jwVbvM4iEr6rpTCFRdnLd+4zNUlx4Ml8UlOB Oct 11 08:03:58 np0005481012 certmonger[38891]: bTh4ayFbVgsbnd8pZTwc37dfUFGqhy5iG59e5P9MnhZVBxUYSfzlvAvs+TbnFVD2 Oct 11 08:03:58 np0005481012 certmonger[38891]: Z+dHtpg2eczUa42KgcNdn2sDd+AqwtE5UwxiHUue3g+T1WF0pAroeNVNSAhv+Iiq Oct 11 08:03:58 np0005481012 certmonger[38891]: HOaJi6or21PMZMTrh02O Oct 11 08:03:58 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:03:58 np0005481012 certmonger[38891]: " Oct 11 08:03:58 np0005481012 certmonger[41357]: 2025-10-11 08:03:58 [41357] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:03:58 np0005481012 certmonger[41357]: MIIFezCCA+OgAwIBAgIBNDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:58 np0005481012 certmonger[41357]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:58 np0005481012 certmonger[41357]: MDM1OFoXDTI3MTAxMjA4MDM1OFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:03:58 np0005481012 certmonger[41357]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:03:58 np0005481012 certmonger[41357]: hvcNAQEBBQADggEPADCCAQoCggEBAKzfq1mzqdWxBw5wtlu9P0lKuyqxEiG3AdFG Oct 11 08:03:58 np0005481012 certmonger[41357]: TAP+RctAlt1CmdgMMw8+tVqGpl13dwuncl4j7vASwScMGU7t7AXSzJAYEkuaaJXX Oct 11 08:03:58 np0005481012 certmonger[41357]: fY5hSFPRI3lIB3y+GyY1r7Tfw5SEzyIzEGa6ZPHmLbUb6MjbQ6hyHZPrQpGzxJJG Oct 11 08:03:58 np0005481012 certmonger[41357]: Lj0qTwddallDcU6GKAmyEy98rxoHDXytFBmOSdNAE7CE/3oUMuviK68CquHxGElI Oct 11 08:03:58 np0005481012 certmonger[41357]: +DE7u6MWbdBnEvbh6nqVrRG15oZCIQ/Scm+CaRiipD7fzRXYQRtIjqggyB61Wl86 Oct 11 08:03:58 np0005481012 certmonger[41357]: ZblXNCx8DcSk1N7vn3s5roU+3xaIXNMBmMsLM9i9BEIIH6PghYUCAwEAAaOCAgww Oct 11 08:03:58 np0005481012 certmonger[41357]: ggIIMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:03:58 np0005481012 certmonger[41357]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:03:58 np0005481012 certmonger[41357]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:03:58 np0005481012 certmonger[41357]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:03:58 np0005481012 certmonger[41357]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:03:58 np0005481012 certmonger[41357]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCksoKjbZCBb5DwWLkOmmQaN Oct 11 08:03:58 np0005481012 certmonger[41357]: RFL+MIHlBgNVHREEgd0wgdqCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:03:58 np0005481012 certmonger[41357]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEIGCisGAQQBgjcU Oct 11 08:03:58 np0005481012 certmonger[41357]: AgOgNAwyaGFwcm94eS9ucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29vLnRlc3RA Oct 11 08:03:58 np0005481012 certmonger[41357]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Oct 11 08:03:58 np0005481012 certmonger[41357]: B2hhcHJveHkbIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkq Oct 11 08:03:58 np0005481012 certmonger[41357]: hkiG9w0BAQsFAAOCAYEAgCcxPofotZAJKGNYpIrSkoArBFRf2A+q4AKaXV0zCk1g Oct 11 08:03:58 np0005481012 certmonger[41357]: IG+KTCwMYwuWUxTvPfDRWx5Q7MR1fQXNX/DXw3vrYtB0Ho8I+BYouTDJ/40LeODo Oct 11 08:03:58 np0005481012 certmonger[41357]: 5NsgGskj6EDusc2fSBbch+8acEouEouo8VHyYuornfSczUspjinKFtuR5D8o5774 Oct 11 08:03:58 np0005481012 certmonger[41357]: KnV8jji1UcL29IXArGafvqy8qglmRZNHXeZMv467ph5S2MLNhD/Lk59blNuOo+PZ Oct 11 08:03:58 np0005481012 certmonger[41357]: ZStRrnLVSUq2k8lQnI7G9bAQQMrRQi3/zSZ1DLUf6r40LqUAhbfEBoRImcsQGLws Oct 11 08:03:58 np0005481012 certmonger[41357]: F5ZfPewQRgG5Encwae/iLpNDuST6jwVbvM4iEr6rpTCFRdnLd+4zNUlx4Ml8UlOB Oct 11 08:03:58 np0005481012 certmonger[41357]: bTh4ayFbVgsbnd8pZTwc37dfUFGqhy5iG59e5P9MnhZVBxUYSfzlvAvs+TbnFVD2 Oct 11 08:03:58 np0005481012 certmonger[41357]: Z+dHtpg2eczUa42KgcNdn2sDd+AqwtE5UwxiHUue3g+T1WF0pAroeNVNSAhv+Iiq Oct 11 08:03:58 np0005481012 certmonger[41357]: HOaJi6or21PMZMTrh02O Oct 11 08:03:58 np0005481012 certmonger[41357]: -----END CERTIFICATE----- Oct 11 08:03:58 np0005481012 certmonger[41357]: ". Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Certificate submission still ongoing. Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Certificate submission postprocessing complete. Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Child status = 0. Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Child output: Oct 11 08:03:58 np0005481012 certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nHOaJi6or21PMZMTrh02O\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:03:58 np0005481012 certmonger[38891]: " Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:03:58 np0005481012 certmonger[38891]: MIIFezCCA+OgAwIBAgIBNDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:58 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:58 np0005481012 certmonger[38891]: MDM1OFoXDTI3MTAxMjA4MDM1OFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:03:58 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:03:58 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAKzfq1mzqdWxBw5wtlu9P0lKuyqxEiG3AdFG Oct 11 08:03:58 np0005481012 certmonger[38891]: TAP+RctAlt1CmdgMMw8+tVqGpl13dwuncl4j7vASwScMGU7t7AXSzJAYEkuaaJXX Oct 11 08:03:58 np0005481012 certmonger[38891]: fY5hSFPRI3lIB3y+GyY1r7Tfw5SEzyIzEGa6ZPHmLbUb6MjbQ6hyHZPrQpGzxJJG Oct 11 08:03:58 np0005481012 certmonger[38891]: Lj0qTwddallDcU6GKAmyEy98rxoHDXytFBmOSdNAE7CE/3oUMuviK68CquHxGElI Oct 11 08:03:58 np0005481012 certmonger[38891]: +DE7u6MWbdBnEvbh6nqVrRG15oZCIQ/Scm+CaRiipD7fzRXYQRtIjqggyB61Wl86 Oct 11 08:03:58 np0005481012 certmonger[38891]: ZblXNCx8DcSk1N7vn3s5roU+3xaIXNMBmMsLM9i9BEIIH6PghYUCAwEAAaOCAgww Oct 11 08:03:58 np0005481012 certmonger[38891]: ggIIMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:03:58 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:03:58 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:03:58 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:03:58 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:03:58 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCksoKjbZCBb5DwWLkOmmQaN Oct 11 08:03:58 np0005481012 certmonger[38891]: RFL+MIHlBgNVHREEgd0wgdqCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:03:58 np0005481012 certmonger[38891]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEIGCisGAQQBgjcU Oct 11 08:03:58 np0005481012 certmonger[38891]: AgOgNAwyaGFwcm94eS9ucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29vLnRlc3RA Oct 11 08:03:58 np0005481012 certmonger[38891]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Oct 11 08:03:58 np0005481012 certmonger[38891]: B2hhcHJveHkbIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkq Oct 11 08:03:58 np0005481012 certmonger[38891]: hkiG9w0BAQsFAAOCAYEAgCcxPofotZAJKGNYpIrSkoArBFRf2A+q4AKaXV0zCk1g Oct 11 08:03:58 np0005481012 certmonger[38891]: IG+KTCwMYwuWUxTvPfDRWx5Q7MR1fQXNX/DXw3vrYtB0Ho8I+BYouTDJ/40LeODo Oct 11 08:03:58 np0005481012 certmonger[38891]: 5NsgGskj6EDusc2fSBbch+8acEouEouo8VHyYuornfSczUspjinKFtuR5D8o5774 Oct 11 08:03:58 np0005481012 certmonger[38891]: KnV8jji1UcL29IXArGafvqy8qglmRZNHXeZMv467ph5S2MLNhD/Lk59blNuOo+PZ Oct 11 08:03:58 np0005481012 certmonger[38891]: ZStRrnLVSUq2k8lQnI7G9bAQQMrRQi3/zSZ1DLUf6r40LqUAhbfEBoRImcsQGLws Oct 11 08:03:58 np0005481012 certmonger[38891]: F5ZfPewQRgG5Encwae/iLpNDuST6jwVbvM4iEr6rpTCFRdnLd+4zNUlx4Ml8UlOB Oct 11 08:03:58 np0005481012 certmonger[38891]: bTh4ayFbVgsbnd8pZTwc37dfUFGqhy5iG59e5P9MnhZVBxUYSfzlvAvs+TbnFVD2 Oct 11 08:03:58 np0005481012 certmonger[38891]: Z+dHtpg2eczUa42KgcNdn2sDd+AqwtE5UwxiHUue3g+T1WF0pAroeNVNSAhv+Iiq Oct 11 08:03:58 np0005481012 certmonger[38891]: HOaJi6or21PMZMTrh02O Oct 11 08:03:58 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:03:58 np0005481012 certmonger[38891]: ". Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] No hooks set for pre-save command. Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 certmonger[38891]: 2025-10-11 08:03:58 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:58 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:59 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:59 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:59 np0005481012 certmonger[38891]: 2025-10-11 08:03:59 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:59 np0005481012 certmonger[38891]: 2025-10-11 08:03:59 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:59 np0005481012 certmonger[41562]: Certificate in file "/etc/pki/tls/certs/haproxy-internal_api-cert.crt" issued by CA and saved. Oct 11 08:03:59 np0005481012 certmonger[38891]: 2025-10-11 08:03:59 [38891] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:59 np0005481012 python3[41578]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q lvm2 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:04:00 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:00 np0005481012 python3[41595]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:04:09 np0005481012 podman[41596]: 2025-10-11 08:04:00.871919395 +0000 UTC m=+0.049793074 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 Oct 11 08:04:09 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:09 np0005481012 python3[41720]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 cluster.common.tag/manila-share:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:04:09 np0005481012 podman[41721]: 2025-10-11 08:04:09.971055981 +0000 UTC m=+0.060785661 image tag 5b8751731d4e88def30b35fe920ea8b7144eb85593c68b79fefc7a35d737b9c5 cluster.common.tag/manila-share:pcmklatest Oct 11 08:04:09 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:10 np0005481012 python3[41747]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:04:11 np0005481012 python3[41767]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:04:14 np0005481012 python3[41784]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:04:18 np0005481012 python3[41801]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:04:18 np0005481012 python3[41817]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:04:18 np0005481012 python3[41833]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:04:19 np0005481012 python3[41851]: ansible-certificate_request Invoked with name=memcached dns=['np0005481012.internalapi.ooo.test'] principal=['memcached/np0005481012.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep memcached)#012service_crt="/etc/pki/tls/certs/memcached.crt"#012service_key="/etc/pki/tls/private/memcached.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec -u root "$container_name" chown memcached:memcached "$service_crt"#012podman exec -u root "$container_name" chown memcached:memcached "$service_key"#012# Send refresh_certs command to memcached to read the new certificate#012memcached_ip="$(hiera -c /etc/puppet/hiera.yaml memcached::listen_ip.0 127.0.0.1)"#012memcached_port="$(hiera -c /etc/puppet/hiera.yaml memcached::tcp_port 11211)"#012echo refresh_certs | openssl s_client -connect $memcached_ip:$memcached_port#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:04:19 np0005481012 certmonger[38891]: 2025-10-11 08:04:19 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:19 np0005481012 certmonger[38891]: 2025-10-11 08:04:19 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:19 np0005481012 certmonger[38891]: 2025-10-11 08:04:19 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:19 np0005481012 certmonger[38891]: 2025-10-11 08:04:19 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:19 np0005481012 certmonger[38891]: 2025-10-11 08:04:19 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:19 np0005481012 certmonger[38891]: 2025-10-11 08:04:19 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:19 np0005481012 certmonger[38891]: 2025-10-11 08:04:19 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:19 np0005481012 certmonger[38891]: 2025-10-11 08:04:19 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:19 np0005481012 certmonger[38891]: 2025-10-11 08:04:19 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:20 np0005481012 certmonger[38891]: 2025-10-11 08:04:20 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:20 np0005481012 certmonger[38891]: 2025-10-11 08:04:20 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:20 np0005481012 certmonger[38891]: 2025-10-11 08:04:20 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:20 np0005481012 certmonger[38891]: 2025-10-11 08:04:20 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:20 np0005481012 certmonger[38891]: 2025-10-11 08:04:20 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:20 np0005481012 certmonger[38891]: 2025-10-11 08:04:20 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:20 np0005481012 certmonger[38891]: 2025-10-11 08:04:20 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:20 np0005481012 certmonger[38891]: 2025-10-11 08:04:20 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:20 np0005481012 certmonger[41861]: 2025-10-11 08:04:20 [41861] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481012.internalapi.ooo.test" for child. Oct 11 08:04:20 np0005481012 certmonger[41861]: 2025-10-11 08:04:20 [41861] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481012.internalapi.ooo.test Oct 11 08:04:20 np0005481012 certmonger[41861]: " for child. Oct 11 08:04:20 np0005481012 certmonger[41861]: 2025-10-11 08:04:20 [41861] Setting "CERTMONGER_REQ_PRINCIPAL" to "memcached/np0005481012.internalapi.ooo.test@OOO.TEST Oct 11 08:04:20 np0005481012 certmonger[41861]: " for child. Oct 11 08:04:20 np0005481012 certmonger[41861]: 2025-10-11 08:04:20 [41861] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:04:20 np0005481012 certmonger[41861]: 2025-10-11 08:04:20 [41861] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:04:20 np0005481012 certmonger[41861]: MIID3DCCAsQCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDEyLmludGVybmFsYXBp Oct 11 08:04:20 np0005481012 certmonger[41861]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAjZEcI7mz Oct 11 08:04:20 np0005481012 certmonger[41861]: fQpLahc3M7mKoxE/1CPbVuXRA0pFW5tEr/kYngjOGP8LqJSeuyFxsDAcrEOcIn5x Oct 11 08:04:20 np0005481012 certmonger[41861]: 6DZ5ofTE2bHtjCqCczU9G1IR2EW8Lup8MRhKMPHnsrikwtu0MFaLnmZJZ906vOqs Oct 11 08:04:20 np0005481012 certmonger[41861]: b8sTMBy7ZrVFzxyDEQC7E2ajLWNfEJjFekjA5Cgjgd+yF1Ys8AKC/qyu9na/Efe2 Oct 11 08:04:20 np0005481012 certmonger[41861]: RW+8Ci6LnDsaA6pRN8Tnq//zLESbJCI2dRjlbBFPQPGBemvzeKz1nUmsUzjj9p2p Oct 11 08:04:20 np0005481012 certmonger[41861]: q2qsnWua0hVpQ3VBqhmIYrLdz3fPnyYUCcfy4CjIYuFekH2h2QNeWevKoxESPxOs Oct 11 08:04:20 np0005481012 certmonger[41861]: 3/i3zHu0PPDyPwIDAQABoIIBaTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:04:20 np0005481012 certmonger[41861]: ADEAMQAwADgAMAA0ADEAOTCCATgGCSqGSIb3DQEJDjGCASkwggElMAsGA1UdDwQE Oct 11 08:04:20 np0005481012 certmonger[41861]: AwIFoDCByQYDVR0RBIHBMIG+giFucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29v Oct 11 08:04:20 np0005481012 certmonger[41861]: LnRlc3SgRAYKKwYBBAGCNxQCA6A2DDRtZW1jYWNoZWQvbnAwMDA1NDgxMDEyLmlu Oct 11 08:04:20 np0005481012 certmonger[41861]: dGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFMGBisGAQUCAqBJMEegChsIT09P Oct 11 08:04:20 np0005481012 certmonger[41861]: LlRFU1ShOTA3oAMCAQGhMDAuGwltZW1jYWNoZWQbIW5wMDAwNTQ4MTAxMi5pbnRl Oct 11 08:04:20 np0005481012 certmonger[41861]: cm5hbGFwaS5vb28udGVzdDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:20 np0005481012 certmonger[41861]: DAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUKd1a6loq7I7REkJ64T/rEDNPVNcwDQYJ Oct 11 08:04:20 np0005481012 certmonger[41861]: KoZIhvcNAQELBQADggEBACRQPA14bLi2xGChMJ3a5QwSn39fDEpDZ8bxOZkbUYQ0 Oct 11 08:04:20 np0005481012 certmonger[41861]: WLTuS35GPOQ50cxG/4al8zULlx34MiSUjSaM9p1l9HlTfRrzoD5AJEezwh8svjgy Oct 11 08:04:20 np0005481012 certmonger[41861]: pHxL1hVvHyFAxIy3TIXViFWTWxC7E2ZMtlJD/2j3Kn0WoOHvd7cbYUzMcrJrDn29 Oct 11 08:04:20 np0005481012 certmonger[41861]: OOazrc0sY2+smET4grqeYgJOxMzF2JKvFQiVfqPQgeaQYLrSPbA/EtCgwZQa3hHo Oct 11 08:04:20 np0005481012 certmonger[41861]: G1JFpNJu8OQxcs8U6k8e0kx+KxV46atOoIeuWV0WnpDcB6dLzfELYFaEVPUYqCwp Oct 11 08:04:20 np0005481012 certmonger[41861]: sOT7TpUM+HBkbA4t86b7KblAokt/r8pQVuoKmIIbARo= Oct 11 08:04:20 np0005481012 certmonger[41861]: -----END CERTIFICATE REQUEST----- Oct 11 08:04:20 np0005481012 certmonger[41861]: " for child. Oct 11 08:04:20 np0005481012 certmonger[41861]: 2025-10-11 08:04:20 [41861] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCNkRwjubN9CktqFzczuYqjET/UI9tW5dEDSkVbm0Sv+RieCM4Y/wuolJ67IXGwMBysQ5wifnHoNnmh9MTZse2MKoJzNT0bUhHYRbwu6nwxGEow8eeyuKTC27QwVoueZkln3Tq86qxvyxMwHLtmtUXPHIMRALsTZqMtY18QmMV6SMDkKCOB37IXVizwAoL+rK72dr8R97ZFb7wKLoucOxoDqlE3xOer//MsRJskIjZ1GOVsEU9A8YF6a/N4rPWdSaxTOOP2namraqyda5rSFWlDdUGqGYhist3Pd8+fJhQJx/LgKMhi4V6QfaHZA15Z68qjERI/E6zf+LfMe7Q88PI/AgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAiDpWxNUU8mdQPy42/0FuLpbRZlGVYalLv2QhO0j9rNW42df7Sc3xVKYme9Em9Jl8E5DJlOBoeeElaKZNV8qtxfDvN3Ic6AEbmADVzlcDkk2jFz7p9IEeh+C7f5DRGCnIKs4qtynkiBAldZGlW8DbFykst9HWlBEzGSmxY6QeZbLWKYAQvj2d56XgsC5btPVrUO9j1L2+JGlp/skUVpxYPcgX2ZwuEJvSzOXuI/4gRSfY7RShzeJ9BfwxlMzx5gPpux7xQ+BHNu3R/mg8ce1rEU7CjJFK49TIRG/gPs/HhJkY4nHAx8eMg5Le4a97zSbUKEAsBITaQsjC2+HXYYZk0A==" for child. Oct 11 08:04:20 np0005481012 certmonger[41861]: 2025-10-11 08:04:20 [41861] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAjZEcI7mzfQpLahc3M7mKoxE/1CPbVuXRA0pFW5tEr/kYngjOGP8LqJSeuyFxsDAcrEOcIn5x6DZ5ofTE2bHtjCqCczU9G1IR2EW8Lup8MRhKMPHnsrikwtu0MFaLnmZJZ906vOqsb8sTMBy7ZrVFzxyDEQC7E2ajLWNfEJjFekjA5Cgjgd+yF1Ys8AKC/qyu9na/Efe2RW+8Ci6LnDsaA6pRN8Tnq//zLESbJCI2dRjlbBFPQPGBemvzeKz1nUmsUzjj9p2pq2qsnWua0hVpQ3VBqhmIYrLdz3fPnyYUCcfy4CjIYuFekH2h2QNeWevKoxESPxOs3/i3zHu0PPDyPwIDAQAB" for child. Oct 11 08:04:20 np0005481012 certmonger[41861]: 2025-10-11 08:04:20 [41861] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:04:20 np0005481012 certmonger[41861]: 2025-10-11 08:04:20 [41861] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:04:20 np0005481012 certmonger[41861]: 2025-10-11 08:04:20 [41861] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:04:20 np0005481012 certmonger[41861]: 2025-10-11 08:04:20 [41861] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:04:20 np0005481012 certmonger[41861]: 2025-10-11 08:04:20 [41861] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:04:20 np0005481012 certmonger[38891]: 2025-10-11 08:04:20 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:20 np0005481012 certmonger[41861]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:04:21 np0005481012 certmonger[41861]: Certificate: "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" Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Certificate submission still ongoing. Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Certificate submission attempt complete. Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Child status = 0. Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Child output: Oct 11 08:04:21 np0005481012 certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 08:04:21 np0005481012 certmonger[38891]: MIIFXzCCA8egAwIBAgIBODANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:21 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:21 np0005481012 certmonger[38891]: MDQyMVoXDTI3MTAxMjA4MDQyMVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:21 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:21 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAI2RHCO5s30KS2oXNzO5iqMRP9Qj21bl0QNK Oct 11 08:04:21 np0005481012 certmonger[38891]: RVubRK/5GJ4Izhj/C6iUnrshcbAwHKxDnCJ+ceg2eaH0xNmx7YwqgnM1PRtSEdhF Oct 11 08:04:21 np0005481012 certmonger[38891]: vC7qfDEYSjDx57K4pMLbtDBWi55mSWfdOrzqrG/LEzAcu2a1Rc8cgxEAuxNmoy1j Oct 11 08:04:21 np0005481012 certmonger[38891]: XxCYxXpIwOQoI4HfshdWLPACgv6srvZ2vxH3tkVvvAoui5w7GgOqUTfE56v/8yxE Oct 11 08:04:21 np0005481012 certmonger[38891]: myQiNnUY5WwRT0DxgXpr83is9Z1JrFM44/adqatqrJ1rmtIVaUN1QaoZiGKy3c93 Oct 11 08:04:21 np0005481012 certmonger[38891]: z58mFAnH8uAoyGLhXpB9odkDXlnryqMREj8TrN/4t8x7tDzw8j8CAwEAAaOCAfAw Oct 11 08:04:21 np0005481012 certmonger[38891]: ggHsMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:21 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:21 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:21 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:21 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:21 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFE8dJJA2DMeCMMqvFGjhoHUp Oct 11 08:04:21 np0005481012 certmonger[38891]: 13bbMIHJBgNVHREEgcEwgb6CIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:21 np0005481012 certmonger[38891]: dGVzdKBEBgorBgEEAYI3FAIDoDYMNG1lbWNhY2hlZC9ucDAwMDU0ODEwMTIuaW50 Oct 11 08:04:21 np0005481012 certmonger[38891]: ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUwYGKwYBBQICoEkwR6AKGwhPT08u Oct 11 08:04:21 np0005481012 certmonger[38891]: VEVTVKE5MDegAwIBAaEwMC4bCW1lbWNhY2hlZBshbnAwMDA1NDgxMDEyLmludGVy Oct 11 08:04:21 np0005481012 certmonger[38891]: bmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQAukNv/ILHsGJNGw6jC Oct 11 08:04:21 np0005481012 certmonger[38891]: 3RrfrjUYw7VuqabaVrHW711uurHxKw0RTBXP098LNpDYZ5RI2DPzEmmjXAB4ky6G Oct 11 08:04:21 np0005481012 certmonger[38891]: J/vZs43uifBvR1VF8m4265eTCkYALzX9COf6YjbSqJH3e+mzacG4Ct7oSyt0BsiY Oct 11 08:04:21 np0005481012 certmonger[38891]: s4syp2GkuRpLNMP69FJ1oQPncpP2xo5GE4ifJ+vXzbS6jwkl8Q5a/8WubK6HUEBe Oct 11 08:04:21 np0005481012 certmonger[38891]: z845Cbmv4Tu9W2Z+PokZH4vP4o2Nz6wwfNYIxpH4jlmowjrCv07R5KG0ycW4TBzk Oct 11 08:04:21 np0005481012 certmonger[38891]: x15WF7NwgL956YWDgKI1BaMjF3L8FitSOFV5csPfof/Nnys3LxKSvvaoheoyyF8V Oct 11 08:04:21 np0005481012 certmonger[38891]: hJHpYqnTfLxVxNZDNBGTANW1HO6QWV2Qd0AFgvybmtsv9icWHYQe8j9rNfKpmUN6 Oct 11 08:04:21 np0005481012 certmonger[38891]: CERaUIwX2grTSH4yzc7tYVqHmb1MAe5r+Q+InOvmN7ckKoLaMUM9rBLjYq4YECtn Oct 11 08:04:21 np0005481012 certmonger[38891]: Y5ULj5JmDw5xHgqpyDW29ln+rfu0eKGqTe/RWjFbMKsPMNc= Oct 11 08:04:21 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:04:21 np0005481012 certmonger[38891]: " Oct 11 08:04:21 np0005481012 certmonger[41863]: 2025-10-11 08:04:21 [41863] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:04:21 np0005481012 certmonger[41863]: MIIFXzCCA8egAwIBAgIBODANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:21 np0005481012 certmonger[41863]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:21 np0005481012 certmonger[41863]: MDQyMVoXDTI3MTAxMjA4MDQyMVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:21 np0005481012 certmonger[41863]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:21 np0005481012 certmonger[41863]: hvcNAQEBBQADggEPADCCAQoCggEBAI2RHCO5s30KS2oXNzO5iqMRP9Qj21bl0QNK Oct 11 08:04:21 np0005481012 certmonger[41863]: RVubRK/5GJ4Izhj/C6iUnrshcbAwHKxDnCJ+ceg2eaH0xNmx7YwqgnM1PRtSEdhF Oct 11 08:04:21 np0005481012 certmonger[41863]: vC7qfDEYSjDx57K4pMLbtDBWi55mSWfdOrzqrG/LEzAcu2a1Rc8cgxEAuxNmoy1j Oct 11 08:04:21 np0005481012 certmonger[41863]: XxCYxXpIwOQoI4HfshdWLPACgv6srvZ2vxH3tkVvvAoui5w7GgOqUTfE56v/8yxE Oct 11 08:04:21 np0005481012 certmonger[41863]: myQiNnUY5WwRT0DxgXpr83is9Z1JrFM44/adqatqrJ1rmtIVaUN1QaoZiGKy3c93 Oct 11 08:04:21 np0005481012 certmonger[41863]: z58mFAnH8uAoyGLhXpB9odkDXlnryqMREj8TrN/4t8x7tDzw8j8CAwEAAaOCAfAw Oct 11 08:04:21 np0005481012 certmonger[41863]: ggHsMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:21 np0005481012 certmonger[41863]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:21 np0005481012 certmonger[41863]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:21 np0005481012 certmonger[41863]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:21 np0005481012 certmonger[41863]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:21 np0005481012 certmonger[41863]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFE8dJJA2DMeCMMqvFGjhoHUp Oct 11 08:04:21 np0005481012 certmonger[41863]: 13bbMIHJBgNVHREEgcEwgb6CIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:21 np0005481012 certmonger[41863]: dGVzdKBEBgorBgEEAYI3FAIDoDYMNG1lbWNhY2hlZC9ucDAwMDU0ODEwMTIuaW50 Oct 11 08:04:21 np0005481012 certmonger[41863]: ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUwYGKwYBBQICoEkwR6AKGwhPT08u Oct 11 08:04:21 np0005481012 certmonger[41863]: VEVTVKE5MDegAwIBAaEwMC4bCW1lbWNhY2hlZBshbnAwMDA1NDgxMDEyLmludGVy Oct 11 08:04:21 np0005481012 certmonger[41863]: bmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQAukNv/ILHsGJNGw6jC Oct 11 08:04:21 np0005481012 certmonger[41863]: 3RrfrjUYw7VuqabaVrHW711uurHxKw0RTBXP098LNpDYZ5RI2DPzEmmjXAB4ky6G Oct 11 08:04:21 np0005481012 certmonger[41863]: J/vZs43uifBvR1VF8m4265eTCkYALzX9COf6YjbSqJH3e+mzacG4Ct7oSyt0BsiY Oct 11 08:04:21 np0005481012 certmonger[41863]: s4syp2GkuRpLNMP69FJ1oQPncpP2xo5GE4ifJ+vXzbS6jwkl8Q5a/8WubK6HUEBe Oct 11 08:04:21 np0005481012 certmonger[41863]: z845Cbmv4Tu9W2Z+PokZH4vP4o2Nz6wwfNYIxpH4jlmowjrCv07R5KG0ycW4TBzk Oct 11 08:04:21 np0005481012 certmonger[41863]: x15WF7NwgL956YWDgKI1BaMjF3L8FitSOFV5csPfof/Nnys3LxKSvvaoheoyyF8V Oct 11 08:04:21 np0005481012 certmonger[41863]: hJHpYqnTfLxVxNZDNBGTANW1HO6QWV2Qd0AFgvybmtsv9icWHYQe8j9rNfKpmUN6 Oct 11 08:04:21 np0005481012 certmonger[41863]: CERaUIwX2grTSH4yzc7tYVqHmb1MAe5r+Q+InOvmN7ckKoLaMUM9rBLjYq4YECtn Oct 11 08:04:21 np0005481012 certmonger[41863]: Y5ULj5JmDw5xHgqpyDW29ln+rfu0eKGqTe/RWjFbMKsPMNc= Oct 11 08:04:21 np0005481012 certmonger[41863]: -----END CERTIFICATE----- Oct 11 08:04:21 np0005481012 certmonger[41863]: ". Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Certificate submission still ongoing. Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Certificate submission postprocessing complete. Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Child status = 0. Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Child output: Oct 11 08:04:21 np0005481012 certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nY5ULj5JmDw5xHgqpyDW29ln+rfu0eKGqTe/RWjFbMKsPMNc=\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:04:21 np0005481012 certmonger[38891]: " Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:04:21 np0005481012 certmonger[38891]: MIIFXzCCA8egAwIBAgIBODANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:21 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:21 np0005481012 certmonger[38891]: MDQyMVoXDTI3MTAxMjA4MDQyMVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:21 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:21 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAI2RHCO5s30KS2oXNzO5iqMRP9Qj21bl0QNK Oct 11 08:04:21 np0005481012 certmonger[38891]: RVubRK/5GJ4Izhj/C6iUnrshcbAwHKxDnCJ+ceg2eaH0xNmx7YwqgnM1PRtSEdhF Oct 11 08:04:21 np0005481012 certmonger[38891]: vC7qfDEYSjDx57K4pMLbtDBWi55mSWfdOrzqrG/LEzAcu2a1Rc8cgxEAuxNmoy1j Oct 11 08:04:21 np0005481012 certmonger[38891]: XxCYxXpIwOQoI4HfshdWLPACgv6srvZ2vxH3tkVvvAoui5w7GgOqUTfE56v/8yxE Oct 11 08:04:21 np0005481012 certmonger[38891]: myQiNnUY5WwRT0DxgXpr83is9Z1JrFM44/adqatqrJ1rmtIVaUN1QaoZiGKy3c93 Oct 11 08:04:21 np0005481012 certmonger[38891]: z58mFAnH8uAoyGLhXpB9odkDXlnryqMREj8TrN/4t8x7tDzw8j8CAwEAAaOCAfAw Oct 11 08:04:21 np0005481012 certmonger[38891]: ggHsMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:21 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:21 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:21 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:21 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:21 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFE8dJJA2DMeCMMqvFGjhoHUp Oct 11 08:04:21 np0005481012 certmonger[38891]: 13bbMIHJBgNVHREEgcEwgb6CIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:21 np0005481012 certmonger[38891]: dGVzdKBEBgorBgEEAYI3FAIDoDYMNG1lbWNhY2hlZC9ucDAwMDU0ODEwMTIuaW50 Oct 11 08:04:21 np0005481012 certmonger[38891]: ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUwYGKwYBBQICoEkwR6AKGwhPT08u Oct 11 08:04:21 np0005481012 certmonger[38891]: VEVTVKE5MDegAwIBAaEwMC4bCW1lbWNhY2hlZBshbnAwMDA1NDgxMDEyLmludGVy Oct 11 08:04:21 np0005481012 certmonger[38891]: bmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQAukNv/ILHsGJNGw6jC Oct 11 08:04:21 np0005481012 certmonger[38891]: 3RrfrjUYw7VuqabaVrHW711uurHxKw0RTBXP098LNpDYZ5RI2DPzEmmjXAB4ky6G Oct 11 08:04:21 np0005481012 certmonger[38891]: J/vZs43uifBvR1VF8m4265eTCkYALzX9COf6YjbSqJH3e+mzacG4Ct7oSyt0BsiY Oct 11 08:04:21 np0005481012 certmonger[38891]: s4syp2GkuRpLNMP69FJ1oQPncpP2xo5GE4ifJ+vXzbS6jwkl8Q5a/8WubK6HUEBe Oct 11 08:04:21 np0005481012 certmonger[38891]: z845Cbmv4Tu9W2Z+PokZH4vP4o2Nz6wwfNYIxpH4jlmowjrCv07R5KG0ycW4TBzk Oct 11 08:04:21 np0005481012 certmonger[38891]: x15WF7NwgL956YWDgKI1BaMjF3L8FitSOFV5csPfof/Nnys3LxKSvvaoheoyyF8V Oct 11 08:04:21 np0005481012 certmonger[38891]: hJHpYqnTfLxVxNZDNBGTANW1HO6QWV2Qd0AFgvybmtsv9icWHYQe8j9rNfKpmUN6 Oct 11 08:04:21 np0005481012 certmonger[38891]: CERaUIwX2grTSH4yzc7tYVqHmb1MAe5r+Q+InOvmN7ckKoLaMUM9rBLjYq4YECtn Oct 11 08:04:21 np0005481012 certmonger[38891]: Y5ULj5JmDw5xHgqpyDW29ln+rfu0eKGqTe/RWjFbMKsPMNc= Oct 11 08:04:21 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:04:21 np0005481012 certmonger[38891]: ". Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] No hooks set for pre-save command. Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:21 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:21 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:21 np0005481012 certmonger[41932]: Certificate in file "/etc/pki/tls/certs/memcached.crt" issued by CA and saved. Oct 11 08:04:21 np0005481012 certmonger[38891]: 2025-10-11 08:04:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080419 Oct 11 08:04:22 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:22 np0005481012 python3[41948]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:04:23 np0005481012 python3[41968]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:04:26 np0005481012 python3[41985]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:04:29 np0005481012 python3[42002]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:04:30 np0005481012 python3[42018]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:04:30 np0005481012 python3[42034]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:04:31 np0005481012 python3[42052]: ansible-certificate_request Invoked with name=metrics_qdr dns=['np0005481012.internalapi.ooo.test'] principal=['metrics_qdr/np0005481012.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep metrics_qdr)#012service_crt="/etc/pki/tls/certs/metrics_qdr.crt"#012service_key="/etc/pki/tls/private/metrics_qdr.key#012# Copy the new cert from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec "$container_name" chown qdrouterd:qdrouterd "$service_crt"#012podman exec "$container_name" chown qdrouterd:qdrouterd "$service_key"#012# Trigger a container restart to read the new certificate#012podman restart "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:04:31 np0005481012 certmonger[38891]: 2025-10-11 08:04:31 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:31 np0005481012 certmonger[38891]: 2025-10-11 08:04:31 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:31 np0005481012 certmonger[38891]: 2025-10-11 08:04:31 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:31 np0005481012 certmonger[38891]: 2025-10-11 08:04:31 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:31 np0005481012 certmonger[38891]: 2025-10-11 08:04:31 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:31 np0005481012 certmonger[38891]: 2025-10-11 08:04:31 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:31 np0005481012 certmonger[38891]: 2025-10-11 08:04:31 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:31 np0005481012 certmonger[38891]: 2025-10-11 08:04:31 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:31 np0005481012 certmonger[38891]: 2025-10-11 08:04:31 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[42062]: 2025-10-11 08:04:32 [42062] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481012.internalapi.ooo.test" for child. Oct 11 08:04:32 np0005481012 certmonger[42062]: 2025-10-11 08:04:32 [42062] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481012.internalapi.ooo.test Oct 11 08:04:32 np0005481012 certmonger[42062]: " for child. Oct 11 08:04:32 np0005481012 certmonger[42062]: 2025-10-11 08:04:32 [42062] Setting "CERTMONGER_REQ_PRINCIPAL" to "metrics_qdr/np0005481012.internalapi.ooo.test@OOO.TEST Oct 11 08:04:32 np0005481012 certmonger[42062]: " for child. Oct 11 08:04:32 np0005481012 certmonger[42062]: 2025-10-11 08:04:32 [42062] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:04:32 np0005481012 certmonger[42062]: 2025-10-11 08:04:32 [42062] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:04:32 np0005481012 certmonger[42062]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDEyLmludGVybmFsYXBp Oct 11 08:04:32 np0005481012 certmonger[42062]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAo6i4U9pv Oct 11 08:04:32 np0005481012 certmonger[42062]: q7qrCnKOH9vnfNY0QTPz9CrSVtlH14zjVnYnaCchVelJMQ6lYo9SsXQW+boApP11 Oct 11 08:04:32 np0005481012 certmonger[42062]: U94woTG1KWWToCjrcTFcUXaCse0+F1u9dQA1t3FXD2PaOdEWRlKWw52HEQ5Z89JJ Oct 11 08:04:32 np0005481012 certmonger[42062]: nAN1+69BaAZ/vhA21UZlMF3fCgGX0CAd6NGIdqvHXO8MD44FAdw5hkFPpjxMpNUH Oct 11 08:04:32 np0005481012 certmonger[42062]: d13jscglobDGxjOfJZmqBj6OisYp+uijxbGtsvEh867AhVBNahcFHra0BFw5+UZg Oct 11 08:04:32 np0005481012 certmonger[42062]: 0MsadznU6iM/yybNWBgCzBrtzCB/daQ9i6SjwcYdBZt9lCPmS+lKDf/rSPC9/DJD Oct 11 08:04:32 np0005481012 certmonger[42062]: NJUvIXg0LLKXxQIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:04:32 np0005481012 certmonger[42062]: ADEAMQAwADgAMAA0ADMAMTCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Oct 11 08:04:32 np0005481012 certmonger[42062]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29v Oct 11 08:04:32 np0005481012 certmonger[42062]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZtZXRyaWNzX3Fkci9ucDAwMDU0ODEwMTIu Oct 11 08:04:32 np0005481012 certmonger[42062]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Oct 11 08:04:32 np0005481012 certmonger[42062]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC21ldHJpY3NfcWRyGyFucDAwMDU0ODEwMTIu Oct 11 08:04:32 np0005481012 certmonger[42062]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Oct 11 08:04:32 np0005481012 certmonger[42062]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFPNEfTAFpZfPOGtR88WRJY0/zttX Oct 11 08:04:32 np0005481012 certmonger[42062]: MA0GCSqGSIb3DQEBCwUAA4IBAQBIPrWpfiE5+O8ryW6Fm1CfqxmZAicWqFGbNNcB Oct 11 08:04:32 np0005481012 certmonger[42062]: ej1T/u43Qht6vtkrQsLuG9H/6kyYQad3hYBLEWaHtQp8NwmyQ+QRMRZktvw9cTAX Oct 11 08:04:32 np0005481012 certmonger[42062]: eN/DKaSWF87ROzDkEtsqEKqQK8fkx8okPlRmUMteLGRjP3twySah1Z6ZUxkwkW2w Oct 11 08:04:32 np0005481012 certmonger[42062]: sYpdB0KPwx7HtVlfAcCDJ/eaPhOyuwetZo4rXMWFE40fFAFMzxhioJ+bs/h7z0lY Oct 11 08:04:32 np0005481012 certmonger[42062]: G9aizrjEeFuUQEHhoyxiBiQGnKAJcu3/IyomeF6kJ05UtnoNHya/ThAzbYWy0hiV Oct 11 08:04:32 np0005481012 certmonger[42062]: xSdQcO8U4ubtS7YzdeBQuIyD7QEAKZAcG66jmgWn7wHBMrxY Oct 11 08:04:32 np0005481012 certmonger[42062]: -----END CERTIFICATE REQUEST----- Oct 11 08:04:32 np0005481012 certmonger[42062]: " for child. Oct 11 08:04:32 np0005481012 certmonger[42062]: 2025-10-11 08:04:32 [42062] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:04:32 np0005481012 certmonger[42062]: 2025-10-11 08:04:32 [42062] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAo6i4U9pvq7qrCnKOH9vnfNY0QTPz9CrSVtlH14zjVnYnaCchVelJMQ6lYo9SsXQW+boApP11U94woTG1KWWToCjrcTFcUXaCse0+F1u9dQA1t3FXD2PaOdEWRlKWw52HEQ5Z89JJnAN1+69BaAZ/vhA21UZlMF3fCgGX0CAd6NGIdqvHXO8MD44FAdw5hkFPpjxMpNUHd13jscglobDGxjOfJZmqBj6OisYp+uijxbGtsvEh867AhVBNahcFHra0BFw5+UZg0MsadznU6iM/yybNWBgCzBrtzCB/daQ9i6SjwcYdBZt9lCPmS+lKDf/rSPC9/DJDNJUvIXg0LLKXxQIDAQAB" for child. Oct 11 08:04:32 np0005481012 certmonger[42062]: 2025-10-11 08:04:32 [42062] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:04:32 np0005481012 certmonger[42062]: 2025-10-11 08:04:32 [42062] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:04:32 np0005481012 certmonger[42062]: 2025-10-11 08:04:32 [42062] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:04:32 np0005481012 certmonger[42062]: 2025-10-11 08:04:32 [42062] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:04:32 np0005481012 certmonger[42062]: 2025-10-11 08:04:32 [42062] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[42062]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:04:32 np0005481012 certmonger[42062]: Certificate: "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" Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Certificate submission still ongoing. Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Certificate submission attempt complete. Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Child status = 0. Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Child output: Oct 11 08:04:32 np0005481012 certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 08:04:32 np0005481012 certmonger[38891]: MIIFYzCCA8ugAwIBAgIBOzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:32 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:32 np0005481012 certmonger[38891]: MDQzMloXDTI3MTAxMjA4MDQzMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:32 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:32 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAKOouFPab6u6qwpyjh/b53zWNEEz8/Qq0lbZ Oct 11 08:04:32 np0005481012 certmonger[38891]: R9eM41Z2J2gnIVXpSTEOpWKPUrF0Fvm6AKT9dVPeMKExtSllk6Ao63ExXFF2grHt Oct 11 08:04:32 np0005481012 certmonger[38891]: PhdbvXUANbdxVw9j2jnRFkZSlsOdhxEOWfPSSZwDdfuvQWgGf74QNtVGZTBd3woB Oct 11 08:04:32 np0005481012 certmonger[38891]: l9AgHejRiHarx1zvDA+OBQHcOYZBT6Y8TKTVB3dd47HIJaGwxsYznyWZqgY+jorG Oct 11 08:04:32 np0005481012 certmonger[38891]: Kfroo8WxrbLxIfOuwIVQTWoXBR62tARcOflGYNDLGnc51OojP8smzVgYAswa7cwg Oct 11 08:04:32 np0005481012 certmonger[38891]: f3WkPYuko8HGHQWbfZQj5kvpSg3/60jwvfwyQzSVLyF4NCyyl8UCAwEAAaOCAfQw Oct 11 08:04:32 np0005481012 certmonger[38891]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:32 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:32 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:32 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:32 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:32 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFB0yVUhiW7IbiSShm2iuqxXE Oct 11 08:04:32 np0005481012 certmonger[38891]: 4GznMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:32 np0005481012 certmonger[38891]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm1ldHJpY3NfcWRyL25wMDAwNTQ4MTAxMi5p Oct 11 08:04:32 np0005481012 certmonger[38891]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:04:32 np0005481012 certmonger[38891]: Ty5URVNUoTswOaADAgEBoTIwMBsLbWV0cmljc19xZHIbIW5wMDAwNTQ4MTAxMi5p Oct 11 08:04:32 np0005481012 certmonger[38891]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAiSOD8mrAYiqv Oct 11 08:04:32 np0005481012 certmonger[38891]: FCNwx1q6iQ4X6kTjrtnrVQxYX3cpYvvR4M90wKFNRnyMRxKuHK/Unv0vh7/IC3qq Oct 11 08:04:32 np0005481012 certmonger[38891]: ea6hmHzTa+iWHxRFJVZrGyom4D6rhCjTL0TsGu7ZJMiPmWGR9NJiye/HT1mVS5/A Oct 11 08:04:32 np0005481012 certmonger[38891]: FKmi1/L5/1Ok7SmQvZdPp7OyOknIk6Y+pShcZbQ3c5ZiWbXSK+1p7OHD5UGcK8jb Oct 11 08:04:32 np0005481012 certmonger[38891]: SZehD6oHxQwuv3wCC+OG28cx3qZERDdeiOovr81I5PIxeFV5gsqed+w2uuU+MEHt Oct 11 08:04:32 np0005481012 certmonger[38891]: sz+JtGRQOQFZGW61SrCRrP2WAYor421baRPJSkoE3KGC+cWjym27jEYyQZZ4+QWy Oct 11 08:04:32 np0005481012 certmonger[38891]: zaRUeVmEyJ/EqsyHTkdxLtFXkCZ/7lqw0sVEBWxlwpXFumeCaqM5t/r/RMlyXF2N Oct 11 08:04:32 np0005481012 certmonger[38891]: Pz2LYva7lBc9+qm9xTFxJiqyWYD1W/V41BplQAi6pV7uqKNxoKBddkfejFRs2MS7 Oct 11 08:04:32 np0005481012 certmonger[38891]: dExXbPNbDiBADVGrcZX4D92oEVDVYWWTy5d9RXGZ0HnEjzf5q801 Oct 11 08:04:32 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:04:32 np0005481012 certmonger[38891]: " Oct 11 08:04:32 np0005481012 certmonger[42064]: 2025-10-11 08:04:32 [42064] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:04:32 np0005481012 certmonger[42064]: MIIFYzCCA8ugAwIBAgIBOzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:32 np0005481012 certmonger[42064]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:32 np0005481012 certmonger[42064]: MDQzMloXDTI3MTAxMjA4MDQzMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:32 np0005481012 certmonger[42064]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:32 np0005481012 certmonger[42064]: hvcNAQEBBQADggEPADCCAQoCggEBAKOouFPab6u6qwpyjh/b53zWNEEz8/Qq0lbZ Oct 11 08:04:32 np0005481012 certmonger[42064]: R9eM41Z2J2gnIVXpSTEOpWKPUrF0Fvm6AKT9dVPeMKExtSllk6Ao63ExXFF2grHt Oct 11 08:04:32 np0005481012 certmonger[42064]: PhdbvXUANbdxVw9j2jnRFkZSlsOdhxEOWfPSSZwDdfuvQWgGf74QNtVGZTBd3woB Oct 11 08:04:32 np0005481012 certmonger[42064]: l9AgHejRiHarx1zvDA+OBQHcOYZBT6Y8TKTVB3dd47HIJaGwxsYznyWZqgY+jorG Oct 11 08:04:32 np0005481012 certmonger[42064]: Kfroo8WxrbLxIfOuwIVQTWoXBR62tARcOflGYNDLGnc51OojP8smzVgYAswa7cwg Oct 11 08:04:32 np0005481012 certmonger[42064]: f3WkPYuko8HGHQWbfZQj5kvpSg3/60jwvfwyQzSVLyF4NCyyl8UCAwEAAaOCAfQw Oct 11 08:04:32 np0005481012 certmonger[42064]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:32 np0005481012 certmonger[42064]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:32 np0005481012 certmonger[42064]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:32 np0005481012 certmonger[42064]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:32 np0005481012 certmonger[42064]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:32 np0005481012 certmonger[42064]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFB0yVUhiW7IbiSShm2iuqxXE Oct 11 08:04:32 np0005481012 certmonger[42064]: 4GznMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:32 np0005481012 certmonger[42064]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm1ldHJpY3NfcWRyL25wMDAwNTQ4MTAxMi5p Oct 11 08:04:32 np0005481012 certmonger[42064]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:04:32 np0005481012 certmonger[42064]: Ty5URVNUoTswOaADAgEBoTIwMBsLbWV0cmljc19xZHIbIW5wMDAwNTQ4MTAxMi5p Oct 11 08:04:32 np0005481012 certmonger[42064]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAiSOD8mrAYiqv Oct 11 08:04:32 np0005481012 certmonger[42064]: FCNwx1q6iQ4X6kTjrtnrVQxYX3cpYvvR4M90wKFNRnyMRxKuHK/Unv0vh7/IC3qq Oct 11 08:04:32 np0005481012 certmonger[42064]: ea6hmHzTa+iWHxRFJVZrGyom4D6rhCjTL0TsGu7ZJMiPmWGR9NJiye/HT1mVS5/A Oct 11 08:04:32 np0005481012 certmonger[42064]: FKmi1/L5/1Ok7SmQvZdPp7OyOknIk6Y+pShcZbQ3c5ZiWbXSK+1p7OHD5UGcK8jb Oct 11 08:04:32 np0005481012 certmonger[42064]: SZehD6oHxQwuv3wCC+OG28cx3qZERDdeiOovr81I5PIxeFV5gsqed+w2uuU+MEHt Oct 11 08:04:32 np0005481012 certmonger[42064]: sz+JtGRQOQFZGW61SrCRrP2WAYor421baRPJSkoE3KGC+cWjym27jEYyQZZ4+QWy Oct 11 08:04:32 np0005481012 certmonger[42064]: zaRUeVmEyJ/EqsyHTkdxLtFXkCZ/7lqw0sVEBWxlwpXFumeCaqM5t/r/RMlyXF2N Oct 11 08:04:32 np0005481012 certmonger[42064]: Pz2LYva7lBc9+qm9xTFxJiqyWYD1W/V41BplQAi6pV7uqKNxoKBddkfejFRs2MS7 Oct 11 08:04:32 np0005481012 certmonger[42064]: dExXbPNbDiBADVGrcZX4D92oEVDVYWWTy5d9RXGZ0HnEjzf5q801 Oct 11 08:04:32 np0005481012 certmonger[42064]: -----END CERTIFICATE----- Oct 11 08:04:32 np0005481012 certmonger[42064]: ". Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Certificate submission still ongoing. Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Certificate submission postprocessing complete. Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Child status = 0. Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Child output: Oct 11 08:04:32 np0005481012 certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----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\ndExXbPNbDiBADVGrcZX4D92oEVDVYWWTy5d9RXGZ0HnEjzf5q801\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:04:32 np0005481012 certmonger[38891]: " Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:04:32 np0005481012 certmonger[38891]: MIIFYzCCA8ugAwIBAgIBOzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:32 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:32 np0005481012 certmonger[38891]: MDQzMloXDTI3MTAxMjA4MDQzMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:32 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:32 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAKOouFPab6u6qwpyjh/b53zWNEEz8/Qq0lbZ Oct 11 08:04:32 np0005481012 certmonger[38891]: R9eM41Z2J2gnIVXpSTEOpWKPUrF0Fvm6AKT9dVPeMKExtSllk6Ao63ExXFF2grHt Oct 11 08:04:32 np0005481012 certmonger[38891]: PhdbvXUANbdxVw9j2jnRFkZSlsOdhxEOWfPSSZwDdfuvQWgGf74QNtVGZTBd3woB Oct 11 08:04:32 np0005481012 certmonger[38891]: l9AgHejRiHarx1zvDA+OBQHcOYZBT6Y8TKTVB3dd47HIJaGwxsYznyWZqgY+jorG Oct 11 08:04:32 np0005481012 certmonger[38891]: Kfroo8WxrbLxIfOuwIVQTWoXBR62tARcOflGYNDLGnc51OojP8smzVgYAswa7cwg Oct 11 08:04:32 np0005481012 certmonger[38891]: f3WkPYuko8HGHQWbfZQj5kvpSg3/60jwvfwyQzSVLyF4NCyyl8UCAwEAAaOCAfQw Oct 11 08:04:32 np0005481012 certmonger[38891]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:32 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:32 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:32 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:32 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:32 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFB0yVUhiW7IbiSShm2iuqxXE Oct 11 08:04:32 np0005481012 certmonger[38891]: 4GznMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:32 np0005481012 certmonger[38891]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm1ldHJpY3NfcWRyL25wMDAwNTQ4MTAxMi5p Oct 11 08:04:32 np0005481012 certmonger[38891]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:04:32 np0005481012 certmonger[38891]: Ty5URVNUoTswOaADAgEBoTIwMBsLbWV0cmljc19xZHIbIW5wMDAwNTQ4MTAxMi5p Oct 11 08:04:32 np0005481012 certmonger[38891]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAiSOD8mrAYiqv Oct 11 08:04:32 np0005481012 certmonger[38891]: FCNwx1q6iQ4X6kTjrtnrVQxYX3cpYvvR4M90wKFNRnyMRxKuHK/Unv0vh7/IC3qq Oct 11 08:04:32 np0005481012 certmonger[38891]: ea6hmHzTa+iWHxRFJVZrGyom4D6rhCjTL0TsGu7ZJMiPmWGR9NJiye/HT1mVS5/A Oct 11 08:04:32 np0005481012 certmonger[38891]: FKmi1/L5/1Ok7SmQvZdPp7OyOknIk6Y+pShcZbQ3c5ZiWbXSK+1p7OHD5UGcK8jb Oct 11 08:04:32 np0005481012 certmonger[38891]: SZehD6oHxQwuv3wCC+OG28cx3qZERDdeiOovr81I5PIxeFV5gsqed+w2uuU+MEHt Oct 11 08:04:32 np0005481012 certmonger[38891]: sz+JtGRQOQFZGW61SrCRrP2WAYor421baRPJSkoE3KGC+cWjym27jEYyQZZ4+QWy Oct 11 08:04:32 np0005481012 certmonger[38891]: zaRUeVmEyJ/EqsyHTkdxLtFXkCZ/7lqw0sVEBWxlwpXFumeCaqM5t/r/RMlyXF2N Oct 11 08:04:32 np0005481012 certmonger[38891]: Pz2LYva7lBc9+qm9xTFxJiqyWYD1W/V41BplQAi6pV7uqKNxoKBddkfejFRs2MS7 Oct 11 08:04:32 np0005481012 certmonger[38891]: dExXbPNbDiBADVGrcZX4D92oEVDVYWWTy5d9RXGZ0HnEjzf5q801 Oct 11 08:04:32 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:04:32 np0005481012 certmonger[38891]: ". Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] No hooks set for pre-save command. Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:32 np0005481012 certmonger[42082]: Certificate in file "/etc/pki/tls/certs/metrics_qdr.crt" issued by CA and saved. Oct 11 08:04:32 np0005481012 certmonger[38891]: 2025-10-11 08:04:32 [38891] Wrote to /var/lib/certmonger/requests/20251011080431 Oct 11 08:04:33 np0005481012 python3[42098]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:04:34 np0005481012 python3[42118]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:04:37 np0005481012 python3[42206]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:04:41 np0005481012 python3[42223]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:04:41 np0005481012 python3[42239]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:04:42 np0005481012 python3[42255]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:04:42 np0005481012 python3[42273]: ansible-certificate_request Invoked with name=mysql dns=['np0005481012.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['mysql/np0005481012.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[42283]: 2025-10-11 08:04:43 [42283] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481012.internalapi.ooo.test" for child. Oct 11 08:04:43 np0005481012 certmonger[42283]: 2025-10-11 08:04:43 [42283] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481012.internalapi.ooo.test Oct 11 08:04:43 np0005481012 certmonger[42283]: overcloud.internalapi.ooo.test Oct 11 08:04:43 np0005481012 certmonger[42283]: " for child. Oct 11 08:04:43 np0005481012 certmonger[42283]: 2025-10-11 08:04:43 [42283] Setting "CERTMONGER_REQ_PRINCIPAL" to "mysql/np0005481012.internalapi.ooo.test@OOO.TEST Oct 11 08:04:43 np0005481012 certmonger[42283]: " for child. Oct 11 08:04:43 np0005481012 certmonger[42283]: 2025-10-11 08:04:43 [42283] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:04:43 np0005481012 certmonger[42283]: 2025-10-11 08:04:43 [42283] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:04:43 np0005481012 certmonger[42283]: MIID9DCCAtwCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDEyLmludGVybmFsYXBp Oct 11 08:04:43 np0005481012 certmonger[42283]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwQ/Ts/vc Oct 11 08:04:43 np0005481012 certmonger[42283]: dZjHL/9oe/PlmA5Dapfsqj2X8lMs5k1dF83LJSQsFCk/In0tDk1UEs3FaFLfFbKP Oct 11 08:04:43 np0005481012 certmonger[42283]: lgdSkYdptc5bfr83NEmgwMZgQv80kVmCqdktBh+13/5JLuKwuJCeTDQ9vXCBTdTp Oct 11 08:04:43 np0005481012 certmonger[42283]: /QBSBoTio/sNNY7PGmDflYHZVUVg4jySYQA6IY6WRz9fJdiA8s7sarKiYwypKk2A Oct 11 08:04:43 np0005481012 certmonger[42283]: wbaOTowHwu0UUFbjbMlAT1luLGapWYHd1TKPDGKtIPGq9J71DFUqmO818lbXK6d2 Oct 11 08:04:43 np0005481012 certmonger[42283]: 6mDuBuqHyELCOuUPjXtlPU6T/VzMpUKlXKv5MtJxySU+Y/C0+HslENdSTFnadrVl Oct 11 08:04:43 np0005481012 certmonger[42283]: ttI0QaUz6BrOTQIDAQABoIIBgTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:04:43 np0005481012 certmonger[42283]: ADEAMQAwADgAMAA0ADQAMzCCAVAGCSqGSIb3DQEJDjGCAUEwggE9MAsGA1UdDwQE Oct 11 08:04:43 np0005481012 certmonger[42283]: AwIFoDCB4QYDVR0RBIHZMIHWgiFucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29v Oct 11 08:04:43 np0005481012 certmonger[42283]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBABgorBgEEAYI3 Oct 11 08:04:43 np0005481012 certmonger[42283]: FAIDoDIMMG15c3FsL25wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdEBP Oct 11 08:04:43 np0005481012 certmonger[42283]: T08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNUoTUwM6ADAgEBoSwwKhsF Oct 11 08:04:43 np0005481012 certmonger[42283]: bXlzcWwbIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDAdBgNVHSUE Oct 11 08:04:43 np0005481012 certmonger[42283]: FjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU Oct 11 08:04:43 np0005481012 certmonger[42283]: /ZlTzs43SQJDf9fEL0Fupg6jr/wwDQYJKoZIhvcNAQELBQADggEBAECnsgs7augS Oct 11 08:04:43 np0005481012 certmonger[42283]: jPzgN/fGX1jL1h5xHOqnJPXZajd0GpKNi2Ccp1U9QMF6wVVERCkcgcxq2AN68R8q Oct 11 08:04:43 np0005481012 certmonger[42283]: oZIYd6TrnwhIqBs3VOWEh2DIkkHyr6DbUduct91Nx8HqCzrzgiDMbv3ADKerRIqt Oct 11 08:04:43 np0005481012 certmonger[42283]: cScHtWoNWYkPWViAT298VKmxaeF5QPXDQnEEHVW9A5pTUntr02xh7sAVtaKUfXUf Oct 11 08:04:43 np0005481012 certmonger[42283]: vdAG0LOlqzejE9e8pncWWvlagc9n3ei9IK7IOKvZjPrxXv8CAI2Q2btkk5T7iKG2 Oct 11 08:04:43 np0005481012 certmonger[42283]: BSC8hc21ZNw2SFEwvoXWR6gPHmkUixF53q1mkdJ+Nbwo4G6jswo73Vtg5EcD1ayx Oct 11 08:04:43 np0005481012 certmonger[42283]: 9GO7/TQmnmg= Oct 11 08:04:43 np0005481012 certmonger[42283]: -----END CERTIFICATE REQUEST----- Oct 11 08:04:43 np0005481012 certmonger[42283]: " for child. Oct 11 08:04:43 np0005481012 certmonger[42283]: 2025-10-11 08:04:43 [42283] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:04:43 np0005481012 certmonger[42283]: 2025-10-11 08:04:43 [42283] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwQ/Ts/vcdZjHL/9oe/PlmA5Dapfsqj2X8lMs5k1dF83LJSQsFCk/In0tDk1UEs3FaFLfFbKPlgdSkYdptc5bfr83NEmgwMZgQv80kVmCqdktBh+13/5JLuKwuJCeTDQ9vXCBTdTp/QBSBoTio/sNNY7PGmDflYHZVUVg4jySYQA6IY6WRz9fJdiA8s7sarKiYwypKk2AwbaOTowHwu0UUFbjbMlAT1luLGapWYHd1TKPDGKtIPGq9J71DFUqmO818lbXK6d26mDuBuqHyELCOuUPjXtlPU6T/VzMpUKlXKv5MtJxySU+Y/C0+HslENdSTFnadrVlttI0QaUz6BrOTQIDAQAB" for child. Oct 11 08:04:43 np0005481012 certmonger[42283]: 2025-10-11 08:04:43 [42283] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:04:43 np0005481012 certmonger[42283]: 2025-10-11 08:04:43 [42283] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:04:43 np0005481012 certmonger[42283]: 2025-10-11 08:04:43 [42283] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:04:43 np0005481012 certmonger[42283]: 2025-10-11 08:04:43 [42283] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:04:43 np0005481012 certmonger[42283]: 2025-10-11 08:04:43 [42283] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[42283]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:04:43 np0005481012 certmonger[42283]: Certificate: "MIIFdzCCA9+gAwIBAgIBPjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4MDQ0M1oXDTI3MTAxMjA4MDQ0M1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMEP07P73HWYxy//aHvz5ZgOQ2qX7Ko9l/JTLOZNXRfNyyUkLBQpPyJ9LQ5NVBLNxWhS3xWyj5YHUpGHabXOW36/NzRJoMDGYEL/NJFZgqnZLQYftd/+SS7isLiQnkw0Pb1wgU3U6f0AUgaE4qP7DTWOzxpg35WB2VVFYOI8kmEAOiGOlkc/XyXYgPLO7GqyomMMqSpNgMG2jk6MB8LtFFBW42zJQE9ZbixmqVmB3dUyjwxirSDxqvSe9QxVKpjvNfJW1yundupg7gbqh8hCwjrlD417ZT1Ok/1czKVCpVyr+TLSccklPmPwtPh7JRDXUkxZ2na1ZbbSNEGlM+gazk0CAwEAAaOCAggwggIEMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJ54tplFUB7sCMpL/D8xFmwCpjYDMIHhBgNVHREEgdkwgdaCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcUAgOgMgwwbXlzcWwvbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVteXNxbBshbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQA3egilKCaAFO9ZadpRXsXqBmkqP8Yln8kJGS0wTlKRQhXucu/wiWdW5v4Y8CQWfKtanK4EV5AuqoDRJ/rETpCnAZ++2qk5xvpAF4624LZtPzSNOU6rEYTO9HfzNitt5kDl4jKvs2m2qW7cWw/BL7F9OueGrAEXFlJ3X/VpX3DqRQKNED3vbGLT8Y+trijkQDhVX7fGZ0Ke9ik5QscFY7cNA4KZ6NuRd2wnHHRMhhYVFK8uyjx3RQ5ryTbEsw/McDtGTFRHhRAsUpzrHw/l1ZUmHmCl38hWCsbBvqv+saf4HqcLI1vF8DNvr6H2kDAln6vRN+BuZ4WDw2wu8G8xIFuitHXy8t0SsMU+T+5DcfibQc59+C5p1yBYeW4ASf+d24xY3UtpeJZ12ttECZtoAhijjJtrjPM+aYnW0XKVzAXFWcfAVbYnp6R552JMuyGUAdEhcMdkPK1tnETkGQeKpRMB7r0BU4wyWsji6/kYeM48+jpcWi1000XFnSIE8VexCcQ=" Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Certificate submission still ongoing. Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Certificate submission attempt complete. Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Child status = 0. Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Child output: Oct 11 08:04:43 np0005481012 certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 08:04:43 np0005481012 certmonger[38891]: MIIFdzCCA9+gAwIBAgIBPjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:43 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:43 np0005481012 certmonger[38891]: MDQ0M1oXDTI3MTAxMjA4MDQ0M1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:43 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:43 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAMEP07P73HWYxy//aHvz5ZgOQ2qX7Ko9l/JT Oct 11 08:04:43 np0005481012 certmonger[38891]: LOZNXRfNyyUkLBQpPyJ9LQ5NVBLNxWhS3xWyj5YHUpGHabXOW36/NzRJoMDGYEL/ Oct 11 08:04:43 np0005481012 certmonger[38891]: NJFZgqnZLQYftd/+SS7isLiQnkw0Pb1wgU3U6f0AUgaE4qP7DTWOzxpg35WB2VVF Oct 11 08:04:43 np0005481012 certmonger[38891]: YOI8kmEAOiGOlkc/XyXYgPLO7GqyomMMqSpNgMG2jk6MB8LtFFBW42zJQE9Zbixm Oct 11 08:04:43 np0005481012 certmonger[38891]: qVmB3dUyjwxirSDxqvSe9QxVKpjvNfJW1yundupg7gbqh8hCwjrlD417ZT1Ok/1c Oct 11 08:04:43 np0005481012 certmonger[38891]: zKVCpVyr+TLSccklPmPwtPh7JRDXUkxZ2na1ZbbSNEGlM+gazk0CAwEAAaOCAggw Oct 11 08:04:43 np0005481012 certmonger[38891]: ggIEMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:43 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:43 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:43 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:43 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:43 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJ54tplFUB7sCMpL/D8xFmwC Oct 11 08:04:43 np0005481012 certmonger[38891]: pjYDMIHhBgNVHREEgdkwgdaCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:43 np0005481012 certmonger[38891]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Oct 11 08:04:43 np0005481012 certmonger[38891]: AgOgMgwwbXlzcWwvbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0QE9P Oct 11 08:04:43 np0005481012 certmonger[38891]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVt Oct 11 08:04:43 np0005481012 certmonger[38891]: eXNxbBshbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Oct 11 08:04:43 np0005481012 certmonger[38891]: DQEBCwUAA4IBgQA3egilKCaAFO9ZadpRXsXqBmkqP8Yln8kJGS0wTlKRQhXucu/w Oct 11 08:04:43 np0005481012 certmonger[38891]: iWdW5v4Y8CQWfKtanK4EV5AuqoDRJ/rETpCnAZ++2qk5xvpAF4624LZtPzSNOU6r Oct 11 08:04:43 np0005481012 certmonger[38891]: EYTO9HfzNitt5kDl4jKvs2m2qW7cWw/BL7F9OueGrAEXFlJ3X/VpX3DqRQKNED3v Oct 11 08:04:43 np0005481012 certmonger[38891]: bGLT8Y+trijkQDhVX7fGZ0Ke9ik5QscFY7cNA4KZ6NuRd2wnHHRMhhYVFK8uyjx3 Oct 11 08:04:43 np0005481012 certmonger[38891]: RQ5ryTbEsw/McDtGTFRHhRAsUpzrHw/l1ZUmHmCl38hWCsbBvqv+saf4HqcLI1vF Oct 11 08:04:43 np0005481012 certmonger[38891]: 8DNvr6H2kDAln6vRN+BuZ4WDw2wu8G8xIFuitHXy8t0SsMU+T+5DcfibQc59+C5p Oct 11 08:04:43 np0005481012 certmonger[38891]: 1yBYeW4ASf+d24xY3UtpeJZ12ttECZtoAhijjJtrjPM+aYnW0XKVzAXFWcfAVbYn Oct 11 08:04:43 np0005481012 certmonger[38891]: p6R552JMuyGUAdEhcMdkPK1tnETkGQeKpRMB7r0BU4wyWsji6/kYeM48+jpcWi10 Oct 11 08:04:43 np0005481012 certmonger[38891]: 00XFnSIE8VexCcQ= Oct 11 08:04:43 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:04:43 np0005481012 certmonger[38891]: " Oct 11 08:04:43 np0005481012 certmonger[42285]: 2025-10-11 08:04:43 [42285] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:04:43 np0005481012 certmonger[42285]: MIIFdzCCA9+gAwIBAgIBPjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:43 np0005481012 certmonger[42285]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:43 np0005481012 certmonger[42285]: MDQ0M1oXDTI3MTAxMjA4MDQ0M1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:43 np0005481012 certmonger[42285]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:43 np0005481012 certmonger[42285]: hvcNAQEBBQADggEPADCCAQoCggEBAMEP07P73HWYxy//aHvz5ZgOQ2qX7Ko9l/JT Oct 11 08:04:43 np0005481012 certmonger[42285]: LOZNXRfNyyUkLBQpPyJ9LQ5NVBLNxWhS3xWyj5YHUpGHabXOW36/NzRJoMDGYEL/ Oct 11 08:04:43 np0005481012 certmonger[42285]: NJFZgqnZLQYftd/+SS7isLiQnkw0Pb1wgU3U6f0AUgaE4qP7DTWOzxpg35WB2VVF Oct 11 08:04:43 np0005481012 certmonger[42285]: YOI8kmEAOiGOlkc/XyXYgPLO7GqyomMMqSpNgMG2jk6MB8LtFFBW42zJQE9Zbixm Oct 11 08:04:43 np0005481012 certmonger[42285]: qVmB3dUyjwxirSDxqvSe9QxVKpjvNfJW1yundupg7gbqh8hCwjrlD417ZT1Ok/1c Oct 11 08:04:43 np0005481012 certmonger[42285]: zKVCpVyr+TLSccklPmPwtPh7JRDXUkxZ2na1ZbbSNEGlM+gazk0CAwEAAaOCAggw Oct 11 08:04:43 np0005481012 certmonger[42285]: ggIEMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:43 np0005481012 certmonger[42285]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:43 np0005481012 certmonger[42285]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:43 np0005481012 certmonger[42285]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:43 np0005481012 certmonger[42285]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:43 np0005481012 certmonger[42285]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJ54tplFUB7sCMpL/D8xFmwC Oct 11 08:04:43 np0005481012 certmonger[42285]: pjYDMIHhBgNVHREEgdkwgdaCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:43 np0005481012 certmonger[42285]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Oct 11 08:04:43 np0005481012 certmonger[42285]: AgOgMgwwbXlzcWwvbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0QE9P Oct 11 08:04:43 np0005481012 certmonger[42285]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVt Oct 11 08:04:43 np0005481012 certmonger[42285]: eXNxbBshbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Oct 11 08:04:43 np0005481012 certmonger[42285]: DQEBCwUAA4IBgQA3egilKCaAFO9ZadpRXsXqBmkqP8Yln8kJGS0wTlKRQhXucu/w Oct 11 08:04:43 np0005481012 certmonger[42285]: iWdW5v4Y8CQWfKtanK4EV5AuqoDRJ/rETpCnAZ++2qk5xvpAF4624LZtPzSNOU6r Oct 11 08:04:43 np0005481012 certmonger[42285]: EYTO9HfzNitt5kDl4jKvs2m2qW7cWw/BL7F9OueGrAEXFlJ3X/VpX3DqRQKNED3v Oct 11 08:04:43 np0005481012 certmonger[42285]: bGLT8Y+trijkQDhVX7fGZ0Ke9ik5QscFY7cNA4KZ6NuRd2wnHHRMhhYVFK8uyjx3 Oct 11 08:04:43 np0005481012 certmonger[42285]: RQ5ryTbEsw/McDtGTFRHhRAsUpzrHw/l1ZUmHmCl38hWCsbBvqv+saf4HqcLI1vF Oct 11 08:04:43 np0005481012 certmonger[42285]: 8DNvr6H2kDAln6vRN+BuZ4WDw2wu8G8xIFuitHXy8t0SsMU+T+5DcfibQc59+C5p Oct 11 08:04:43 np0005481012 certmonger[42285]: 1yBYeW4ASf+d24xY3UtpeJZ12ttECZtoAhijjJtrjPM+aYnW0XKVzAXFWcfAVbYn Oct 11 08:04:43 np0005481012 certmonger[42285]: p6R552JMuyGUAdEhcMdkPK1tnETkGQeKpRMB7r0BU4wyWsji6/kYeM48+jpcWi10 Oct 11 08:04:43 np0005481012 certmonger[42285]: 00XFnSIE8VexCcQ= Oct 11 08:04:43 np0005481012 certmonger[42285]: -----END CERTIFICATE----- Oct 11 08:04:43 np0005481012 certmonger[42285]: ". Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Certificate submission still ongoing. Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Certificate submission postprocessing complete. Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Child status = 0. Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Child output: Oct 11 08:04:43 np0005481012 certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n00XFnSIE8VexCcQ=\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:04:43 np0005481012 certmonger[38891]: " Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:04:43 np0005481012 certmonger[38891]: MIIFdzCCA9+gAwIBAgIBPjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:43 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:43 np0005481012 certmonger[38891]: MDQ0M1oXDTI3MTAxMjA4MDQ0M1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:43 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:43 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAMEP07P73HWYxy//aHvz5ZgOQ2qX7Ko9l/JT Oct 11 08:04:43 np0005481012 certmonger[38891]: LOZNXRfNyyUkLBQpPyJ9LQ5NVBLNxWhS3xWyj5YHUpGHabXOW36/NzRJoMDGYEL/ Oct 11 08:04:43 np0005481012 certmonger[38891]: NJFZgqnZLQYftd/+SS7isLiQnkw0Pb1wgU3U6f0AUgaE4qP7DTWOzxpg35WB2VVF Oct 11 08:04:43 np0005481012 certmonger[38891]: YOI8kmEAOiGOlkc/XyXYgPLO7GqyomMMqSpNgMG2jk6MB8LtFFBW42zJQE9Zbixm Oct 11 08:04:43 np0005481012 certmonger[38891]: qVmB3dUyjwxirSDxqvSe9QxVKpjvNfJW1yundupg7gbqh8hCwjrlD417ZT1Ok/1c Oct 11 08:04:43 np0005481012 certmonger[38891]: zKVCpVyr+TLSccklPmPwtPh7JRDXUkxZ2na1ZbbSNEGlM+gazk0CAwEAAaOCAggw Oct 11 08:04:43 np0005481012 certmonger[38891]: ggIEMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:43 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:43 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:43 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:43 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:43 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJ54tplFUB7sCMpL/D8xFmwC Oct 11 08:04:43 np0005481012 certmonger[38891]: pjYDMIHhBgNVHREEgdkwgdaCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:43 np0005481012 certmonger[38891]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Oct 11 08:04:43 np0005481012 certmonger[38891]: AgOgMgwwbXlzcWwvbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0QE9P Oct 11 08:04:43 np0005481012 certmonger[38891]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVt Oct 11 08:04:43 np0005481012 certmonger[38891]: eXNxbBshbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Oct 11 08:04:43 np0005481012 certmonger[38891]: DQEBCwUAA4IBgQA3egilKCaAFO9ZadpRXsXqBmkqP8Yln8kJGS0wTlKRQhXucu/w Oct 11 08:04:43 np0005481012 certmonger[38891]: iWdW5v4Y8CQWfKtanK4EV5AuqoDRJ/rETpCnAZ++2qk5xvpAF4624LZtPzSNOU6r Oct 11 08:04:43 np0005481012 certmonger[38891]: EYTO9HfzNitt5kDl4jKvs2m2qW7cWw/BL7F9OueGrAEXFlJ3X/VpX3DqRQKNED3v Oct 11 08:04:43 np0005481012 certmonger[38891]: bGLT8Y+trijkQDhVX7fGZ0Ke9ik5QscFY7cNA4KZ6NuRd2wnHHRMhhYVFK8uyjx3 Oct 11 08:04:43 np0005481012 certmonger[38891]: RQ5ryTbEsw/McDtGTFRHhRAsUpzrHw/l1ZUmHmCl38hWCsbBvqv+saf4HqcLI1vF Oct 11 08:04:43 np0005481012 certmonger[38891]: 8DNvr6H2kDAln6vRN+BuZ4WDw2wu8G8xIFuitHXy8t0SsMU+T+5DcfibQc59+C5p Oct 11 08:04:43 np0005481012 certmonger[38891]: 1yBYeW4ASf+d24xY3UtpeJZ12ttECZtoAhijjJtrjPM+aYnW0XKVzAXFWcfAVbYn Oct 11 08:04:43 np0005481012 certmonger[38891]: p6R552JMuyGUAdEhcMdkPK1tnETkGQeKpRMB7r0BU4wyWsji6/kYeM48+jpcWi10 Oct 11 08:04:43 np0005481012 certmonger[38891]: 00XFnSIE8VexCcQ= Oct 11 08:04:43 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:04:43 np0005481012 certmonger[38891]: ". Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] No hooks set for pre-save command. Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] No hooks set for post-save command. Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:43 np0005481012 certmonger[42289]: Certificate in file "/etc/pki/tls/certs/mysql.crt" issued by CA and saved. Oct 11 08:04:43 np0005481012 certmonger[38891]: 2025-10-11 08:04:43 [38891] Wrote to /var/lib/certmonger/requests/20251011080443 Oct 11 08:04:44 np0005481012 python3[42305]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:04:51 np0005481012 podman[42306]: 2025-10-11 08:04:44.5239976 +0000 UTC m=+0.055923078 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Oct 11 08:04:51 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:52 np0005481012 python3[42417]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 cluster.common.tag/mariadb:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:04:52 np0005481012 podman[42418]: 2025-10-11 08:04:52.154782648 +0000 UTC m=+0.034613938 image tag eb2deacebcb0e732dc23a6e49150052f3f1724aa184df8abe621651e45eee06c cluster.common.tag/mariadb:pcmklatest Oct 11 08:04:52 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:52 np0005481012 python3[42445]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:04:53 np0005481012 python3[42465]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:04:56 np0005481012 python3[42482]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:05:00 np0005481012 python3[42499]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:05:00 np0005481012 python3[42515]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:05:00 np0005481012 python3[42531]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:05:01 np0005481012 python3[42549]: ansible-certificate_request Invoked with name=neutron_ovn dns=['np0005481012.internalapi.ooo.test'] principal=['neutron_ovn/np0005481012.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Oct 11 08:05:01 np0005481012 certmonger[38891]: 2025-10-11 08:05:01 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:01 np0005481012 certmonger[38891]: 2025-10-11 08:05:01 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:01 np0005481012 certmonger[38891]: 2025-10-11 08:05:01 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:01 np0005481012 certmonger[38891]: 2025-10-11 08:05:01 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:01 np0005481012 certmonger[38891]: 2025-10-11 08:05:01 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:01 np0005481012 certmonger[38891]: 2025-10-11 08:05:01 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:01 np0005481012 certmonger[38891]: 2025-10-11 08:05:01 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:01 np0005481012 certmonger[38891]: 2025-10-11 08:05:01 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:01 np0005481012 certmonger[38891]: 2025-10-11 08:05:01 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[42559]: 2025-10-11 08:05:02 [42559] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481012.internalapi.ooo.test" for child. Oct 11 08:05:02 np0005481012 certmonger[42559]: 2025-10-11 08:05:02 [42559] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481012.internalapi.ooo.test Oct 11 08:05:02 np0005481012 certmonger[42559]: " for child. Oct 11 08:05:02 np0005481012 certmonger[42559]: 2025-10-11 08:05:02 [42559] Setting "CERTMONGER_REQ_PRINCIPAL" to "neutron_ovn/np0005481012.internalapi.ooo.test@OOO.TEST Oct 11 08:05:02 np0005481012 certmonger[42559]: " for child. Oct 11 08:05:02 np0005481012 certmonger[42559]: 2025-10-11 08:05:02 [42559] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:05:02 np0005481012 certmonger[42559]: 2025-10-11 08:05:02 [42559] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:05:02 np0005481012 certmonger[42559]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDEyLmludGVybmFsYXBp Oct 11 08:05:02 np0005481012 certmonger[42559]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmVhfO43g Oct 11 08:05:02 np0005481012 certmonger[42559]: Xt57Eyq2Si9smKfiIEcDgGEK2mziuW+GRygzOx6TmSz+jqVh8r14dMtb37IF4Krr Oct 11 08:05:02 np0005481012 certmonger[42559]: YMQtiTkjPV7zeIPmc9P60eg0rfoMpN9K7z9TjTtpWAs/LMuziMgbP6k5fAocRClT Oct 11 08:05:02 np0005481012 certmonger[42559]: A+IJhFaOu2UlJlRFpbJC2vmwki54plkighSFWfR41+tv6ZPN1pZuMgo0+qz6gmhN Oct 11 08:05:02 np0005481012 certmonger[42559]: /awllRYBcAmT9sW65FTq5auentyNeaKvEWj0qSuadAe8w1YxAd2Oh/jQzWNTx8w1 Oct 11 08:05:02 np0005481012 certmonger[42559]: jtMtNpaOHwQfcL7zxKetxpPmP0cVVH012HNuje8nhy86DUm15kpkyvc49wSq957v Oct 11 08:05:02 np0005481012 certmonger[42559]: rIk5J7VRuWqNKwIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:05:02 np0005481012 certmonger[42559]: ADEAMQAwADgAMAA1ADAAMTCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Oct 11 08:05:02 np0005481012 certmonger[42559]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29v Oct 11 08:05:02 np0005481012 certmonger[42559]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZuZXV0cm9uX292bi9ucDAwMDU0ODEwMTIu Oct 11 08:05:02 np0005481012 certmonger[42559]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Oct 11 08:05:02 np0005481012 certmonger[42559]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC25ldXRyb25fb3ZuGyFucDAwMDU0ODEwMTIu Oct 11 08:05:02 np0005481012 certmonger[42559]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Oct 11 08:05:02 np0005481012 certmonger[42559]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFBH7MCPfr8LYWy+sSVaqO61947pp Oct 11 08:05:02 np0005481012 certmonger[42559]: MA0GCSqGSIb3DQEBCwUAA4IBAQAd5bS6MeLfRd3uLCQ3+CdEVhvcynY179obOyFt Oct 11 08:05:02 np0005481012 certmonger[42559]: vaMz6WzHpf05056iiGthnuJ8IcYNv1rrPTCjKgOrJDQF08ohgIOm3XdDeNTqSJWR Oct 11 08:05:02 np0005481012 certmonger[42559]: cyIbwMwpYjopbUHQd2GrouVpJzg4EBNbCDvJ8qzmSJ4cTECyIFrW+r1IAWvcrDd8 Oct 11 08:05:02 np0005481012 certmonger[42559]: OIiUXozY/SOZQ7PaTkZi59h0uS5HYPQAEA+mo1uVudCEm+ND2nTG+un3utuciRvL Oct 11 08:05:02 np0005481012 certmonger[42559]: EsEjIlJXbABl3CJWLF0UBUH/ApLr7n3dNsYBh4hR6MpIu1Tzhv9wqdNCBqJMDEKO Oct 11 08:05:02 np0005481012 certmonger[42559]: up5fLuCvy+2kHU4s3rco9KxgLRD082/boHcqLmA8I4/TxUBt Oct 11 08:05:02 np0005481012 certmonger[42559]: -----END CERTIFICATE REQUEST----- Oct 11 08:05:02 np0005481012 certmonger[42559]: " for child. Oct 11 08:05:02 np0005481012 certmonger[42559]: 2025-10-11 08:05:02 [42559] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:05:02 np0005481012 certmonger[42559]: 2025-10-11 08:05:02 [42559] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmVhfO43gXt57Eyq2Si9smKfiIEcDgGEK2mziuW+GRygzOx6TmSz+jqVh8r14dMtb37IF4KrrYMQtiTkjPV7zeIPmc9P60eg0rfoMpN9K7z9TjTtpWAs/LMuziMgbP6k5fAocRClTA+IJhFaOu2UlJlRFpbJC2vmwki54plkighSFWfR41+tv6ZPN1pZuMgo0+qz6gmhN/awllRYBcAmT9sW65FTq5auentyNeaKvEWj0qSuadAe8w1YxAd2Oh/jQzWNTx8w1jtMtNpaOHwQfcL7zxKetxpPmP0cVVH012HNuje8nhy86DUm15kpkyvc49wSq957vrIk5J7VRuWqNKwIDAQAB" for child. Oct 11 08:05:02 np0005481012 certmonger[42559]: 2025-10-11 08:05:02 [42559] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:05:02 np0005481012 certmonger[42559]: 2025-10-11 08:05:02 [42559] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:05:02 np0005481012 certmonger[42559]: 2025-10-11 08:05:02 [42559] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:05:02 np0005481012 certmonger[42559]: 2025-10-11 08:05:02 [42559] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:05:02 np0005481012 certmonger[42559]: 2025-10-11 08:05:02 [42559] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[42559]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:05:02 np0005481012 certmonger[42559]: Certificate: "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" Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Certificate submission still ongoing. Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Certificate submission attempt complete. Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Child status = 0. Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Child output: Oct 11 08:05:02 np0005481012 certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 08:05:02 np0005481012 certmonger[38891]: MIIFYzCCA8ugAwIBAgIBRDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:02 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:02 np0005481012 certmonger[38891]: MDUwMloXDTI3MTAxMjA4MDUwMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:02 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:02 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAJlYXzuN4F7eexMqtkovbJin4iBHA4BhCtps Oct 11 08:05:02 np0005481012 certmonger[38891]: 4rlvhkcoMzsek5ks/o6lYfK9eHTLW9+yBeCq62DELYk5Iz1e83iD5nPT+tHoNK36 Oct 11 08:05:02 np0005481012 certmonger[38891]: DKTfSu8/U407aVgLPyzLs4jIGz+pOXwKHEQpUwPiCYRWjrtlJSZURaWyQtr5sJIu Oct 11 08:05:02 np0005481012 certmonger[38891]: eKZZIoIUhVn0eNfrb+mTzdaWbjIKNPqs+oJoTf2sJZUWAXAJk/bFuuRU6uWrnp7c Oct 11 08:05:02 np0005481012 certmonger[38891]: jXmirxFo9KkrmnQHvMNWMQHdjof40M1jU8fMNY7TLTaWjh8EH3C+88SnrcaT5j9H Oct 11 08:05:02 np0005481012 certmonger[38891]: FVR9Ndhzbo3vJ4cvOg1JteZKZMr3OPcEqvee76yJOSe1UblqjSsCAwEAAaOCAfQw Oct 11 08:05:02 np0005481012 certmonger[38891]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:02 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:02 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:02 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:02 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:02 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFGn9HJvVpvWE2YOLyFMTI89M Oct 11 08:05:02 np0005481012 certmonger[38891]: En5sMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:02 np0005481012 certmonger[38891]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3ZuL25wMDAwNTQ4MTAxMi5p Oct 11 08:05:02 np0005481012 certmonger[38891]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:05:02 np0005481012 certmonger[38891]: Ty5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4bIW5wMDAwNTQ4MTAxMi5p Oct 11 08:05:02 np0005481012 certmonger[38891]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAImUIANsQtt9v Oct 11 08:05:02 np0005481012 certmonger[38891]: jKmiVJMYfNN8vo4u0++FNUDeEAhaNH/xOxCJmVZQXNJFjENmbPo0/PMeUmH821e8 Oct 11 08:05:02 np0005481012 certmonger[38891]: B8/ILCvh2HcJcIuOIRE8zFt/XxDtVOkrkT8MphF16VYpFHLhYYNzdDRmhJb6Cmpr Oct 11 08:05:02 np0005481012 certmonger[38891]: xiNOH/lK0Ytgw6y2Oz030j1bIZYj/Mo3kDZaYO7b5bEEhQ0hf7eEacXpxm0P+Ni0 Oct 11 08:05:02 np0005481012 certmonger[38891]: ie6QF6KTCUV/R01hqWMtgfRpzmLv3iOLFisWQJzzk/zw+ulC4Tf6QHYKosYZTTsS Oct 11 08:05:02 np0005481012 certmonger[38891]: d21FlfzVurAYO45EPYH+dIsSL98DbuelNrCZri6FL5ZKsTMZHguPHPZnACqBvM3E Oct 11 08:05:02 np0005481012 certmonger[38891]: eZyfKLMNv0PazpfmuY5truD6vMVu8/7MCgBFI6BYUjGW9e+29EviNpzqWlscEkUz Oct 11 08:05:02 np0005481012 certmonger[38891]: 2LEq5tBTUfB9VW/eJ7asX02CAMBDQ4UiOLOezbc9jcl/IiI9tQv4Gj9gbQwnQ0fv Oct 11 08:05:02 np0005481012 certmonger[38891]: dDELp1SvamNeJmY9KcGFOk6U7VxZd8WFU3B5e5meV/z22ubUjJKH Oct 11 08:05:02 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:05:02 np0005481012 certmonger[38891]: " Oct 11 08:05:02 np0005481012 certmonger[42561]: 2025-10-11 08:05:02 [42561] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:05:02 np0005481012 certmonger[42561]: MIIFYzCCA8ugAwIBAgIBRDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:02 np0005481012 certmonger[42561]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:02 np0005481012 certmonger[42561]: MDUwMloXDTI3MTAxMjA4MDUwMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:02 np0005481012 certmonger[42561]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:02 np0005481012 certmonger[42561]: hvcNAQEBBQADggEPADCCAQoCggEBAJlYXzuN4F7eexMqtkovbJin4iBHA4BhCtps Oct 11 08:05:02 np0005481012 certmonger[42561]: 4rlvhkcoMzsek5ks/o6lYfK9eHTLW9+yBeCq62DELYk5Iz1e83iD5nPT+tHoNK36 Oct 11 08:05:02 np0005481012 certmonger[42561]: DKTfSu8/U407aVgLPyzLs4jIGz+pOXwKHEQpUwPiCYRWjrtlJSZURaWyQtr5sJIu Oct 11 08:05:02 np0005481012 certmonger[42561]: eKZZIoIUhVn0eNfrb+mTzdaWbjIKNPqs+oJoTf2sJZUWAXAJk/bFuuRU6uWrnp7c Oct 11 08:05:02 np0005481012 certmonger[42561]: jXmirxFo9KkrmnQHvMNWMQHdjof40M1jU8fMNY7TLTaWjh8EH3C+88SnrcaT5j9H Oct 11 08:05:02 np0005481012 certmonger[42561]: FVR9Ndhzbo3vJ4cvOg1JteZKZMr3OPcEqvee76yJOSe1UblqjSsCAwEAAaOCAfQw Oct 11 08:05:02 np0005481012 certmonger[42561]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:02 np0005481012 certmonger[42561]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:02 np0005481012 certmonger[42561]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:02 np0005481012 certmonger[42561]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:02 np0005481012 certmonger[42561]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:02 np0005481012 certmonger[42561]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFGn9HJvVpvWE2YOLyFMTI89M Oct 11 08:05:02 np0005481012 certmonger[42561]: En5sMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:02 np0005481012 certmonger[42561]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3ZuL25wMDAwNTQ4MTAxMi5p Oct 11 08:05:02 np0005481012 certmonger[42561]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:05:02 np0005481012 certmonger[42561]: Ty5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4bIW5wMDAwNTQ4MTAxMi5p Oct 11 08:05:02 np0005481012 certmonger[42561]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAImUIANsQtt9v Oct 11 08:05:02 np0005481012 certmonger[42561]: jKmiVJMYfNN8vo4u0++FNUDeEAhaNH/xOxCJmVZQXNJFjENmbPo0/PMeUmH821e8 Oct 11 08:05:02 np0005481012 certmonger[42561]: B8/ILCvh2HcJcIuOIRE8zFt/XxDtVOkrkT8MphF16VYpFHLhYYNzdDRmhJb6Cmpr Oct 11 08:05:02 np0005481012 certmonger[42561]: xiNOH/lK0Ytgw6y2Oz030j1bIZYj/Mo3kDZaYO7b5bEEhQ0hf7eEacXpxm0P+Ni0 Oct 11 08:05:02 np0005481012 certmonger[42561]: ie6QF6KTCUV/R01hqWMtgfRpzmLv3iOLFisWQJzzk/zw+ulC4Tf6QHYKosYZTTsS Oct 11 08:05:02 np0005481012 certmonger[42561]: d21FlfzVurAYO45EPYH+dIsSL98DbuelNrCZri6FL5ZKsTMZHguPHPZnACqBvM3E Oct 11 08:05:02 np0005481012 certmonger[42561]: eZyfKLMNv0PazpfmuY5truD6vMVu8/7MCgBFI6BYUjGW9e+29EviNpzqWlscEkUz Oct 11 08:05:02 np0005481012 certmonger[42561]: 2LEq5tBTUfB9VW/eJ7asX02CAMBDQ4UiOLOezbc9jcl/IiI9tQv4Gj9gbQwnQ0fv Oct 11 08:05:02 np0005481012 certmonger[42561]: dDELp1SvamNeJmY9KcGFOk6U7VxZd8WFU3B5e5meV/z22ubUjJKH Oct 11 08:05:02 np0005481012 certmonger[42561]: -----END CERTIFICATE----- Oct 11 08:05:02 np0005481012 certmonger[42561]: ". Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Certificate submission still ongoing. Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Certificate submission postprocessing complete. Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Child status = 0. Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Child output: Oct 11 08:05:02 np0005481012 certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----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\ndDELp1SvamNeJmY9KcGFOk6U7VxZd8WFU3B5e5meV/z22ubUjJKH\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:05:02 np0005481012 certmonger[38891]: " Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:05:02 np0005481012 certmonger[38891]: MIIFYzCCA8ugAwIBAgIBRDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:02 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:02 np0005481012 certmonger[38891]: MDUwMloXDTI3MTAxMjA4MDUwMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:02 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:02 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAJlYXzuN4F7eexMqtkovbJin4iBHA4BhCtps Oct 11 08:05:02 np0005481012 certmonger[38891]: 4rlvhkcoMzsek5ks/o6lYfK9eHTLW9+yBeCq62DELYk5Iz1e83iD5nPT+tHoNK36 Oct 11 08:05:02 np0005481012 certmonger[38891]: DKTfSu8/U407aVgLPyzLs4jIGz+pOXwKHEQpUwPiCYRWjrtlJSZURaWyQtr5sJIu Oct 11 08:05:02 np0005481012 certmonger[38891]: eKZZIoIUhVn0eNfrb+mTzdaWbjIKNPqs+oJoTf2sJZUWAXAJk/bFuuRU6uWrnp7c Oct 11 08:05:02 np0005481012 certmonger[38891]: jXmirxFo9KkrmnQHvMNWMQHdjof40M1jU8fMNY7TLTaWjh8EH3C+88SnrcaT5j9H Oct 11 08:05:02 np0005481012 certmonger[38891]: FVR9Ndhzbo3vJ4cvOg1JteZKZMr3OPcEqvee76yJOSe1UblqjSsCAwEAAaOCAfQw Oct 11 08:05:02 np0005481012 certmonger[38891]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:02 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:02 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:02 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:02 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:02 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFGn9HJvVpvWE2YOLyFMTI89M Oct 11 08:05:02 np0005481012 certmonger[38891]: En5sMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:02 np0005481012 certmonger[38891]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3ZuL25wMDAwNTQ4MTAxMi5p Oct 11 08:05:02 np0005481012 certmonger[38891]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:05:02 np0005481012 certmonger[38891]: Ty5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4bIW5wMDAwNTQ4MTAxMi5p Oct 11 08:05:02 np0005481012 certmonger[38891]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAImUIANsQtt9v Oct 11 08:05:02 np0005481012 certmonger[38891]: jKmiVJMYfNN8vo4u0++FNUDeEAhaNH/xOxCJmVZQXNJFjENmbPo0/PMeUmH821e8 Oct 11 08:05:02 np0005481012 certmonger[38891]: B8/ILCvh2HcJcIuOIRE8zFt/XxDtVOkrkT8MphF16VYpFHLhYYNzdDRmhJb6Cmpr Oct 11 08:05:02 np0005481012 certmonger[38891]: xiNOH/lK0Ytgw6y2Oz030j1bIZYj/Mo3kDZaYO7b5bEEhQ0hf7eEacXpxm0P+Ni0 Oct 11 08:05:02 np0005481012 certmonger[38891]: ie6QF6KTCUV/R01hqWMtgfRpzmLv3iOLFisWQJzzk/zw+ulC4Tf6QHYKosYZTTsS Oct 11 08:05:02 np0005481012 certmonger[38891]: d21FlfzVurAYO45EPYH+dIsSL98DbuelNrCZri6FL5ZKsTMZHguPHPZnACqBvM3E Oct 11 08:05:02 np0005481012 certmonger[38891]: eZyfKLMNv0PazpfmuY5truD6vMVu8/7MCgBFI6BYUjGW9e+29EviNpzqWlscEkUz Oct 11 08:05:02 np0005481012 certmonger[38891]: 2LEq5tBTUfB9VW/eJ7asX02CAMBDQ4UiOLOezbc9jcl/IiI9tQv4Gj9gbQwnQ0fv Oct 11 08:05:02 np0005481012 certmonger[38891]: dDELp1SvamNeJmY9KcGFOk6U7VxZd8WFU3B5e5meV/z22ubUjJKH Oct 11 08:05:02 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:05:02 np0005481012 certmonger[38891]: ". Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] No hooks set for pre-save command. Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] No hooks set for post-save command. Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:02 np0005481012 certmonger[42565]: Certificate in file "/etc/pki/tls/certs/neutron_ovn.crt" issued by CA and saved. Oct 11 08:05:02 np0005481012 certmonger[38891]: 2025-10-11 08:05:02 [38891] Wrote to /var/lib/certmonger/requests/20251011080501 Oct 11 08:05:03 np0005481012 python3[42581]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:05:04 np0005481012 python3[42601]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:05:07 np0005481012 python3[42618]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:05:10 np0005481012 python3[42635]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:05:10 np0005481012 python3[42651]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:05:11 np0005481012 python3[42667]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:05:12 np0005481012 python3[42685]: ansible-certificate_request Invoked with name=libvirt-vnc-client-cert dns=['np0005481012.internalapi.ooo.test'] principal=['libvirt-vnc/np0005481012.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep nova_vnc_proxy)#012service_crt="/etc/pki/tls/certs/libvirt-vnc-client-cert.crt"#012service_key="/etc/pki/tls/private/libvirt-vnc-client-cert.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012#012# Set permissions#012podman exec -u root "$container_name" chmod 0644 $service_crt#012podman exec -u root "$container_name" chmod 0640 $service_key#012podman exec -u root "$container_name" chgrp qemu $service_key#012#012# No need to trigger a reload for novnc proxy since the cert is not cached#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[42695]: 2025-10-11 08:05:12 [42695] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481012.internalapi.ooo.test" for child. Oct 11 08:05:12 np0005481012 certmonger[42695]: 2025-10-11 08:05:12 [42695] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481012.internalapi.ooo.test Oct 11 08:05:12 np0005481012 certmonger[42695]: " for child. Oct 11 08:05:12 np0005481012 certmonger[42695]: 2025-10-11 08:05:12 [42695] Setting "CERTMONGER_REQ_PRINCIPAL" to "libvirt-vnc/np0005481012.internalapi.ooo.test@OOO.TEST Oct 11 08:05:12 np0005481012 certmonger[42695]: " for child. Oct 11 08:05:12 np0005481012 certmonger[42695]: 2025-10-11 08:05:12 [42695] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:05:12 np0005481012 certmonger[42695]: 2025-10-11 08:05:12 [42695] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:05:12 np0005481012 certmonger[42695]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDEyLmludGVybmFsYXBp Oct 11 08:05:12 np0005481012 certmonger[42695]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArrny1aAi Oct 11 08:05:12 np0005481012 certmonger[42695]: iItsjUo3hQZK7GBLHb3qQVPWye7yGd4egYclr5yreUU+rDW6KJUX7q8K1bUX45h/ Oct 11 08:05:12 np0005481012 certmonger[42695]: /3Mnztmgcst+OwqiaPe+5fdWuNn26l3a4pFwctb4d5VHtz/db5JXpErBpVobmz9Y Oct 11 08:05:12 np0005481012 certmonger[42695]: fDNaj0GLrnpKO9qZoSCIvCPPtWNC2Dw+uTvKJBABiH6fMyacWj9Jj4n3FkIjszDS Oct 11 08:05:12 np0005481012 certmonger[42695]: yxBu0eC5E4vX+7+m1Y9m76XRvFwKnaXF3SLr4ah7wx8pTLQHB7bDM0Zn/qvsus9p Oct 11 08:05:12 np0005481012 certmonger[42695]: 6genCzV8Uu62CtZvHjybUS5Qc2jCeykYPVv5mkyKt3SsT1ex8zuP02lOhyAIB55v Oct 11 08:05:12 np0005481012 certmonger[42695]: 3ikPRxhWygXrpwIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:05:12 np0005481012 certmonger[42695]: ADEAMQAwADgAMAA1ADEAMjCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Oct 11 08:05:12 np0005481012 certmonger[42695]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29v Oct 11 08:05:12 np0005481012 certmonger[42695]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZsaWJ2aXJ0LXZuYy9ucDAwMDU0ODEwMTIu Oct 11 08:05:12 np0005481012 certmonger[42695]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Oct 11 08:05:12 np0005481012 certmonger[42695]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC2xpYnZpcnQtdm5jGyFucDAwMDU0ODEwMTIu Oct 11 08:05:12 np0005481012 certmonger[42695]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Oct 11 08:05:12 np0005481012 certmonger[42695]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFK/WXu/v9jkXmcbgUsrJL9kNUvCe Oct 11 08:05:12 np0005481012 certmonger[42695]: MA0GCSqGSIb3DQEBCwUAA4IBAQA+CHwEhSmDj+3u36JX5en5rGNjyUsMccQmctoM Oct 11 08:05:12 np0005481012 certmonger[42695]: QqeWi/ia3bbhu0Effuxu41DpO3quAbi9G0oGSxVAlcbba1rLdaPVDppM3Ie/aXSB Oct 11 08:05:12 np0005481012 certmonger[42695]: pnI2OBNho/ElQw4rQMdhaDpY7eEY9xAE5n3ugn6Y0A1CpROQkJ5dhlCeMChGGXRo Oct 11 08:05:12 np0005481012 certmonger[42695]: /S4TFlrqDUzaCZzWFRFjmhJ886ekwnwBP2+8ksSWWPEJqm72k4DVmbTpF+hWNdEq Oct 11 08:05:12 np0005481012 certmonger[42695]: /v1Us98mV/pBLOODp9BQicCIorLHcPRn6CK9rmB4ZiYT1+apMwYXE9vowMZMQOXY Oct 11 08:05:12 np0005481012 certmonger[42695]: r4h5UrAscywCYc6s/dIvmaCpY/NeSSPD4Y+qc8p0TL7TjXBH Oct 11 08:05:12 np0005481012 certmonger[42695]: -----END CERTIFICATE REQUEST----- Oct 11 08:05:12 np0005481012 certmonger[42695]: " for child. Oct 11 08:05:12 np0005481012 certmonger[42695]: 2025-10-11 08:05:12 [42695] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:05:12 np0005481012 certmonger[42695]: 2025-10-11 08:05:12 [42695] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArrny1aAiiItsjUo3hQZK7GBLHb3qQVPWye7yGd4egYclr5yreUU+rDW6KJUX7q8K1bUX45h//3Mnztmgcst+OwqiaPe+5fdWuNn26l3a4pFwctb4d5VHtz/db5JXpErBpVobmz9YfDNaj0GLrnpKO9qZoSCIvCPPtWNC2Dw+uTvKJBABiH6fMyacWj9Jj4n3FkIjszDSyxBu0eC5E4vX+7+m1Y9m76XRvFwKnaXF3SLr4ah7wx8pTLQHB7bDM0Zn/qvsus9p6genCzV8Uu62CtZvHjybUS5Qc2jCeykYPVv5mkyKt3SsT1ex8zuP02lOhyAIB55v3ikPRxhWygXrpwIDAQAB" for child. Oct 11 08:05:12 np0005481012 certmonger[42695]: 2025-10-11 08:05:12 [42695] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:05:12 np0005481012 certmonger[42695]: 2025-10-11 08:05:12 [42695] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:05:12 np0005481012 certmonger[42695]: 2025-10-11 08:05:12 [42695] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:05:12 np0005481012 certmonger[42695]: 2025-10-11 08:05:12 [42695] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:05:12 np0005481012 certmonger[42695]: 2025-10-11 08:05:12 [42695] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[42695]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:05:12 np0005481012 certmonger[42695]: Certificate: "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" Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Certificate submission still ongoing. Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Certificate submission attempt complete. Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Child status = 0. Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Child output: Oct 11 08:05:12 np0005481012 certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 08:05:12 np0005481012 certmonger[38891]: MIIFYzCCA8ugAwIBAgIBSjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:12 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:12 np0005481012 certmonger[38891]: MDUxMloXDTI3MTAxMjA4MDUxMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:12 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:12 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAK658tWgIoiLbI1KN4UGSuxgSx296kFT1snu Oct 11 08:05:12 np0005481012 certmonger[38891]: 8hneHoGHJa+cq3lFPqw1uiiVF+6vCtW1F+OYf/9zJ87ZoHLLfjsKomj3vuX3VrjZ Oct 11 08:05:12 np0005481012 certmonger[38891]: 9upd2uKRcHLW+HeVR7c/3W+SV6RKwaVaG5s/WHwzWo9Bi656SjvamaEgiLwjz7Vj Oct 11 08:05:12 np0005481012 certmonger[38891]: Qtg8Prk7yiQQAYh+nzMmnFo/SY+J9xZCI7Mw0ssQbtHguROL1/u/ptWPZu+l0bxc Oct 11 08:05:12 np0005481012 certmonger[38891]: Cp2lxd0i6+Goe8MfKUy0Bwe2wzNGZ/6r7LrPaeoHpws1fFLutgrWbx48m1EuUHNo Oct 11 08:05:12 np0005481012 certmonger[38891]: wnspGD1b+ZpMird0rE9XsfM7j9NpTocgCAeeb94pD0cYVsoF66cCAwEAAaOCAfQw Oct 11 08:05:12 np0005481012 certmonger[38891]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:12 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:12 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:12 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:12 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:12 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFwVK4wc5HwM8FV8N0ilFsBD Oct 11 08:05:12 np0005481012 certmonger[38891]: 4wETMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:12 np0005481012 certmonger[38891]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNmxpYnZpcnQtdm5jL25wMDAwNTQ4MTAxMi5p Oct 11 08:05:12 np0005481012 certmonger[38891]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:05:12 np0005481012 certmonger[38891]: Ty5URVNUoTswOaADAgEBoTIwMBsLbGlidmlydC12bmMbIW5wMDAwNTQ4MTAxMi5p Oct 11 08:05:12 np0005481012 certmonger[38891]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAQQBLVCXZf8AF Oct 11 08:05:12 np0005481012 certmonger[38891]: zE9BGSxjEo+HUvML1MMdsWne10jTDiUGZTN9MpemGB402w/VULkfH1z57tV1hhL5 Oct 11 08:05:12 np0005481012 certmonger[38891]: 3mVAQ23w5balYhNZVpwLYRHqqndh+GHwV0hiNCalGHHaCLGuIHCDn/9qTSfBiInl Oct 11 08:05:12 np0005481012 certmonger[38891]: apnLEDllwRgigun76h4FjCU8rqFUEsE6Vv5cw/VrOYOhjyXsJQp6b/HVZHgGTct9 Oct 11 08:05:12 np0005481012 certmonger[38891]: exKXow25dfMRLsnPj+sf2ZfwqpaNwW7sOyl9ydjfHWyqc1d+9CchOIq4I76Wy10I Oct 11 08:05:12 np0005481012 certmonger[38891]: s+njF9q+uy1SL2p5k5wukOc8AQ22NH3BpNz6hOiIg8lbnVJoW5VIsXJT1quu2aON Oct 11 08:05:12 np0005481012 certmonger[38891]: EBfzQ8GOREobDFXWk2Rv8Rm78QU2i2fWam9GeJZNn5d2HaoTqLxVLf7AFW/TAdMN Oct 11 08:05:12 np0005481012 certmonger[38891]: kAE/ThAhrTm2B8yJLhgIfzch28JlomKpVSiKriEfpZKTT3vRQagySjbRvjSIIEVa Oct 11 08:05:12 np0005481012 certmonger[38891]: 5Vv8CYcWgiVwohKDYqxsVAq9TerKG+JRLU2RdKC/5OPbH6z7t4A+ Oct 11 08:05:12 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:05:12 np0005481012 certmonger[38891]: " Oct 11 08:05:12 np0005481012 certmonger[42697]: 2025-10-11 08:05:12 [42697] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:05:12 np0005481012 certmonger[42697]: MIIFYzCCA8ugAwIBAgIBSjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:12 np0005481012 certmonger[42697]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:12 np0005481012 certmonger[42697]: MDUxMloXDTI3MTAxMjA4MDUxMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:12 np0005481012 certmonger[42697]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:12 np0005481012 certmonger[42697]: hvcNAQEBBQADggEPADCCAQoCggEBAK658tWgIoiLbI1KN4UGSuxgSx296kFT1snu Oct 11 08:05:12 np0005481012 certmonger[42697]: 8hneHoGHJa+cq3lFPqw1uiiVF+6vCtW1F+OYf/9zJ87ZoHLLfjsKomj3vuX3VrjZ Oct 11 08:05:12 np0005481012 certmonger[42697]: 9upd2uKRcHLW+HeVR7c/3W+SV6RKwaVaG5s/WHwzWo9Bi656SjvamaEgiLwjz7Vj Oct 11 08:05:12 np0005481012 certmonger[42697]: Qtg8Prk7yiQQAYh+nzMmnFo/SY+J9xZCI7Mw0ssQbtHguROL1/u/ptWPZu+l0bxc Oct 11 08:05:12 np0005481012 certmonger[42697]: Cp2lxd0i6+Goe8MfKUy0Bwe2wzNGZ/6r7LrPaeoHpws1fFLutgrWbx48m1EuUHNo Oct 11 08:05:12 np0005481012 certmonger[42697]: wnspGD1b+ZpMird0rE9XsfM7j9NpTocgCAeeb94pD0cYVsoF66cCAwEAAaOCAfQw Oct 11 08:05:12 np0005481012 certmonger[42697]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:12 np0005481012 certmonger[42697]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:12 np0005481012 certmonger[42697]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:12 np0005481012 certmonger[42697]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:12 np0005481012 certmonger[42697]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:12 np0005481012 certmonger[42697]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFwVK4wc5HwM8FV8N0ilFsBD Oct 11 08:05:12 np0005481012 certmonger[42697]: 4wETMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:12 np0005481012 certmonger[42697]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNmxpYnZpcnQtdm5jL25wMDAwNTQ4MTAxMi5p Oct 11 08:05:12 np0005481012 certmonger[42697]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:05:12 np0005481012 certmonger[42697]: Ty5URVNUoTswOaADAgEBoTIwMBsLbGlidmlydC12bmMbIW5wMDAwNTQ4MTAxMi5p Oct 11 08:05:12 np0005481012 certmonger[42697]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAQQBLVCXZf8AF Oct 11 08:05:12 np0005481012 certmonger[42697]: zE9BGSxjEo+HUvML1MMdsWne10jTDiUGZTN9MpemGB402w/VULkfH1z57tV1hhL5 Oct 11 08:05:12 np0005481012 certmonger[42697]: 3mVAQ23w5balYhNZVpwLYRHqqndh+GHwV0hiNCalGHHaCLGuIHCDn/9qTSfBiInl Oct 11 08:05:12 np0005481012 certmonger[42697]: apnLEDllwRgigun76h4FjCU8rqFUEsE6Vv5cw/VrOYOhjyXsJQp6b/HVZHgGTct9 Oct 11 08:05:12 np0005481012 certmonger[42697]: exKXow25dfMRLsnPj+sf2ZfwqpaNwW7sOyl9ydjfHWyqc1d+9CchOIq4I76Wy10I Oct 11 08:05:12 np0005481012 certmonger[42697]: s+njF9q+uy1SL2p5k5wukOc8AQ22NH3BpNz6hOiIg8lbnVJoW5VIsXJT1quu2aON Oct 11 08:05:12 np0005481012 certmonger[42697]: EBfzQ8GOREobDFXWk2Rv8Rm78QU2i2fWam9GeJZNn5d2HaoTqLxVLf7AFW/TAdMN Oct 11 08:05:12 np0005481012 certmonger[42697]: kAE/ThAhrTm2B8yJLhgIfzch28JlomKpVSiKriEfpZKTT3vRQagySjbRvjSIIEVa Oct 11 08:05:12 np0005481012 certmonger[42697]: 5Vv8CYcWgiVwohKDYqxsVAq9TerKG+JRLU2RdKC/5OPbH6z7t4A+ Oct 11 08:05:12 np0005481012 certmonger[42697]: -----END CERTIFICATE----- Oct 11 08:05:12 np0005481012 certmonger[42697]: ". Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Certificate submission still ongoing. Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Certificate submission postprocessing complete. Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Child status = 0. Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Child output: Oct 11 08:05:12 np0005481012 certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n5Vv8CYcWgiVwohKDYqxsVAq9TerKG+JRLU2RdKC/5OPbH6z7t4A+\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:05:12 np0005481012 certmonger[38891]: " Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:05:12 np0005481012 certmonger[38891]: MIIFYzCCA8ugAwIBAgIBSjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:12 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:12 np0005481012 certmonger[38891]: MDUxMloXDTI3MTAxMjA4MDUxMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:12 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:12 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAK658tWgIoiLbI1KN4UGSuxgSx296kFT1snu Oct 11 08:05:12 np0005481012 certmonger[38891]: 8hneHoGHJa+cq3lFPqw1uiiVF+6vCtW1F+OYf/9zJ87ZoHLLfjsKomj3vuX3VrjZ Oct 11 08:05:12 np0005481012 certmonger[38891]: 9upd2uKRcHLW+HeVR7c/3W+SV6RKwaVaG5s/WHwzWo9Bi656SjvamaEgiLwjz7Vj Oct 11 08:05:12 np0005481012 certmonger[38891]: Qtg8Prk7yiQQAYh+nzMmnFo/SY+J9xZCI7Mw0ssQbtHguROL1/u/ptWPZu+l0bxc Oct 11 08:05:12 np0005481012 certmonger[38891]: Cp2lxd0i6+Goe8MfKUy0Bwe2wzNGZ/6r7LrPaeoHpws1fFLutgrWbx48m1EuUHNo Oct 11 08:05:12 np0005481012 certmonger[38891]: wnspGD1b+ZpMird0rE9XsfM7j9NpTocgCAeeb94pD0cYVsoF66cCAwEAAaOCAfQw Oct 11 08:05:12 np0005481012 certmonger[38891]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:12 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:12 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:12 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:12 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:12 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFwVK4wc5HwM8FV8N0ilFsBD Oct 11 08:05:12 np0005481012 certmonger[38891]: 4wETMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:12 np0005481012 certmonger[38891]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNmxpYnZpcnQtdm5jL25wMDAwNTQ4MTAxMi5p Oct 11 08:05:12 np0005481012 certmonger[38891]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:05:12 np0005481012 certmonger[38891]: Ty5URVNUoTswOaADAgEBoTIwMBsLbGlidmlydC12bmMbIW5wMDAwNTQ4MTAxMi5p Oct 11 08:05:12 np0005481012 certmonger[38891]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAQQBLVCXZf8AF Oct 11 08:05:12 np0005481012 certmonger[38891]: zE9BGSxjEo+HUvML1MMdsWne10jTDiUGZTN9MpemGB402w/VULkfH1z57tV1hhL5 Oct 11 08:05:12 np0005481012 certmonger[38891]: 3mVAQ23w5balYhNZVpwLYRHqqndh+GHwV0hiNCalGHHaCLGuIHCDn/9qTSfBiInl Oct 11 08:05:12 np0005481012 certmonger[38891]: apnLEDllwRgigun76h4FjCU8rqFUEsE6Vv5cw/VrOYOhjyXsJQp6b/HVZHgGTct9 Oct 11 08:05:12 np0005481012 certmonger[38891]: exKXow25dfMRLsnPj+sf2ZfwqpaNwW7sOyl9ydjfHWyqc1d+9CchOIq4I76Wy10I Oct 11 08:05:12 np0005481012 certmonger[38891]: s+njF9q+uy1SL2p5k5wukOc8AQ22NH3BpNz6hOiIg8lbnVJoW5VIsXJT1quu2aON Oct 11 08:05:12 np0005481012 certmonger[38891]: EBfzQ8GOREobDFXWk2Rv8Rm78QU2i2fWam9GeJZNn5d2HaoTqLxVLf7AFW/TAdMN Oct 11 08:05:12 np0005481012 certmonger[38891]: kAE/ThAhrTm2B8yJLhgIfzch28JlomKpVSiKriEfpZKTT3vRQagySjbRvjSIIEVa Oct 11 08:05:12 np0005481012 certmonger[38891]: 5Vv8CYcWgiVwohKDYqxsVAq9TerKG+JRLU2RdKC/5OPbH6z7t4A+ Oct 11 08:05:12 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:05:12 np0005481012 certmonger[38891]: ". Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] No hooks set for pre-save command. Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:12 np0005481012 certmonger[38891]: 2025-10-11 08:05:12 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:13 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:05:13 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:05:13 np0005481012 certmonger[38891]: 2025-10-11 08:05:13 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:13 np0005481012 certmonger[38891]: 2025-10-11 08:05:13 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:13 np0005481012 certmonger[42774]: Certificate in file "/etc/pki/tls/certs/libvirt-vnc-client-cert.crt" issued by CA and saved. Oct 11 08:05:13 np0005481012 certmonger[38891]: 2025-10-11 08:05:13 [38891] Wrote to /var/lib/certmonger/requests/20251011080512 Oct 11 08:05:14 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:05:14 np0005481012 python3[42790]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:05:14 np0005481012 python3[42810]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:05:17 np0005481012 python3[42827]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:05:20 np0005481012 python3[42844]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:05:21 np0005481012 python3[42860]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:05:22 np0005481012 python3[42876]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:05:23 np0005481012 python3[42964]: ansible-certificate_request Invoked with name=novnc-proxy dns=['np0005481012.internalapi.ooo.test'] principal=['novnc-proxy/np0005481012.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep nova_vnc_proxy)#012service_crt="/etc/pki/tls/certs/novnc-proxy.crt"#012service_key="/etc/pki/tls/private/novnc-proxy.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012#012# Set permissions#012podman exec -u root "$container_name" chmod 0644 $service_crt#012podman exec -u root "$container_name" chmod 0640 $service_key#012podman exec -u root "$container_name" chgrp qemu $service_key#012#012# No need to trigger a reload for novnc proxy since the cert is not cached#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[42974]: 2025-10-11 08:05:23 [42974] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481012.internalapi.ooo.test" for child. Oct 11 08:05:23 np0005481012 certmonger[42974]: 2025-10-11 08:05:23 [42974] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481012.internalapi.ooo.test Oct 11 08:05:23 np0005481012 certmonger[42974]: " for child. Oct 11 08:05:23 np0005481012 certmonger[42974]: 2025-10-11 08:05:23 [42974] Setting "CERTMONGER_REQ_PRINCIPAL" to "novnc-proxy/np0005481012.internalapi.ooo.test@OOO.TEST Oct 11 08:05:23 np0005481012 certmonger[42974]: " for child. Oct 11 08:05:23 np0005481012 certmonger[42974]: 2025-10-11 08:05:23 [42974] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:05:23 np0005481012 certmonger[42974]: 2025-10-11 08:05:23 [42974] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:05:23 np0005481012 certmonger[42974]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDEyLmludGVybmFsYXBp Oct 11 08:05:23 np0005481012 certmonger[42974]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmjcvp9ej Oct 11 08:05:23 np0005481012 certmonger[42974]: Sx+pVE0DnZ8xfP5fAadCPw+o9knaQR2J8dZCsjekHNbU9ZBJEYTP7OtHRFmZbdOU Oct 11 08:05:23 np0005481012 certmonger[42974]: EVSJK63R12fpfp8szf/Fhi08WcCci+6B7FSNO988EzktwwNn/gJ65W/f9Xu8R2cV Oct 11 08:05:23 np0005481012 certmonger[42974]: XtFAj56VOJHb483lDcpP+tkpC+uyjD3y9MSOiTMLc+sm5EleWzLzgnZ0/WsxemZd Oct 11 08:05:23 np0005481012 certmonger[42974]: L6TFX1oPgKu8GGEDgqRd2ipvGlNF7qebhS0Vm0AiBAIW4r6qB1cOPqxa+7ukJEHk Oct 11 08:05:23 np0005481012 certmonger[42974]: 7i+6FyljFdZ4vRDLYJYHkbLN3LTJjPDgzLLXcJGXK7SdlKDSg5trMlMk7yTqSLm0 Oct 11 08:05:23 np0005481012 certmonger[42974]: qpNMs7BhNRJOXwIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:05:23 np0005481012 certmonger[42974]: ADEAMQAwADgAMAA1ADIAMzCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Oct 11 08:05:23 np0005481012 certmonger[42974]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29v Oct 11 08:05:23 np0005481012 certmonger[42974]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZub3ZuYy1wcm94eS9ucDAwMDU0ODEwMTIu Oct 11 08:05:23 np0005481012 certmonger[42974]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Oct 11 08:05:23 np0005481012 certmonger[42974]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC25vdm5jLXByb3h5GyFucDAwMDU0ODEwMTIu Oct 11 08:05:23 np0005481012 certmonger[42974]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Oct 11 08:05:23 np0005481012 certmonger[42974]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFEYqhB82iRf2HYLKv7HaE3qDrYzF Oct 11 08:05:23 np0005481012 certmonger[42974]: MA0GCSqGSIb3DQEBCwUAA4IBAQBaysGjhuUfwXys5TOfXvD5nbUFow2ztPYKQr09 Oct 11 08:05:23 np0005481012 certmonger[42974]: fGpWKz3OicqK1oIMw5qYi+OeTRqD5JzKegUWjuA5tTZjF6aoph/cc1i7OmUIwtMW Oct 11 08:05:23 np0005481012 certmonger[42974]: H0imz6uDJ+GQ+aAfJaChERRYXa4VcteLM78izk6SlpwqubApQSG7qotxrlz9DZFy Oct 11 08:05:23 np0005481012 certmonger[42974]: k/Pt+Xdxh58k2pauMuiuJ14rGXhk9VuIDKB5Ec00fz711mv44xA6gO1M+aZm0neF Oct 11 08:05:23 np0005481012 certmonger[42974]: wgH5qhz1hwNywCt58kGZFRIptTDjCY+6TtBVcqwAmyDZaJaLm3mImu3WuPiT/lhx Oct 11 08:05:23 np0005481012 certmonger[42974]: jybRlIgQOfVcg4SyniikSI7vP4Qtu3+he43vNBWLo3jN/zPb Oct 11 08:05:23 np0005481012 certmonger[42974]: -----END CERTIFICATE REQUEST----- Oct 11 08:05:23 np0005481012 certmonger[42974]: " for child. Oct 11 08:05:23 np0005481012 certmonger[42974]: 2025-10-11 08:05:23 [42974] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:05:23 np0005481012 certmonger[42974]: 2025-10-11 08:05:23 [42974] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmjcvp9ejSx+pVE0DnZ8xfP5fAadCPw+o9knaQR2J8dZCsjekHNbU9ZBJEYTP7OtHRFmZbdOUEVSJK63R12fpfp8szf/Fhi08WcCci+6B7FSNO988EzktwwNn/gJ65W/f9Xu8R2cVXtFAj56VOJHb483lDcpP+tkpC+uyjD3y9MSOiTMLc+sm5EleWzLzgnZ0/WsxemZdL6TFX1oPgKu8GGEDgqRd2ipvGlNF7qebhS0Vm0AiBAIW4r6qB1cOPqxa+7ukJEHk7i+6FyljFdZ4vRDLYJYHkbLN3LTJjPDgzLLXcJGXK7SdlKDSg5trMlMk7yTqSLm0qpNMs7BhNRJOXwIDAQAB" for child. Oct 11 08:05:23 np0005481012 certmonger[42974]: 2025-10-11 08:05:23 [42974] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:05:23 np0005481012 certmonger[42974]: 2025-10-11 08:05:23 [42974] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:05:23 np0005481012 certmonger[42974]: 2025-10-11 08:05:23 [42974] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:05:23 np0005481012 certmonger[42974]: 2025-10-11 08:05:23 [42974] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:05:23 np0005481012 certmonger[42974]: 2025-10-11 08:05:23 [42974] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[42974]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:05:23 np0005481012 certmonger[42974]: Certificate: "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" Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Certificate submission still ongoing. Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Certificate submission attempt complete. Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Child status = 0. Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Child output: Oct 11 08:05:23 np0005481012 certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 08:05:23 np0005481012 certmonger[38891]: MIIFYzCCA8ugAwIBAgIBTTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:23 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:23 np0005481012 certmonger[38891]: MDUyM1oXDTI3MTAxMjA4MDUyM1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:23 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:23 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAJo3L6fXo0sfqVRNA52fMXz+XwGnQj8PqPZJ Oct 11 08:05:23 np0005481012 certmonger[38891]: 2kEdifHWQrI3pBzW1PWQSRGEz+zrR0RZmW3TlBFUiSut0ddn6X6fLM3/xYYtPFnA Oct 11 08:05:23 np0005481012 certmonger[38891]: nIvugexUjTvfPBM5LcMDZ/4CeuVv3/V7vEdnFV7RQI+elTiR2+PN5Q3KT/rZKQvr Oct 11 08:05:23 np0005481012 certmonger[38891]: sow98vTEjokzC3PrJuRJXlsy84J2dP1rMXpmXS+kxV9aD4CrvBhhA4KkXdoqbxpT Oct 11 08:05:23 np0005481012 certmonger[38891]: Re6nm4UtFZtAIgQCFuK+qgdXDj6sWvu7pCRB5O4vuhcpYxXWeL0Qy2CWB5Gyzdy0 Oct 11 08:05:23 np0005481012 certmonger[38891]: yYzw4Myy13CRlyu0nZSg0oObazJTJO8k6ki5tKqTTLOwYTUSTl8CAwEAAaOCAfQw Oct 11 08:05:23 np0005481012 certmonger[38891]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:23 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:23 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:23 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:23 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:23 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFO0UC7DxJOxzc8N57c3ARzgC Oct 11 08:05:23 np0005481012 certmonger[38891]: KIc3MIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:23 np0005481012 certmonger[38891]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5L25wMDAwNTQ4MTAxMi5p Oct 11 08:05:23 np0005481012 certmonger[38891]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:05:23 np0005481012 certmonger[38891]: Ty5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkbIW5wMDAwNTQ4MTAxMi5p Oct 11 08:05:23 np0005481012 certmonger[38891]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEABLhDgwfXY0fG Oct 11 08:05:23 np0005481012 certmonger[38891]: UhqzJRfoMuGkhb13zLNR7VN238Kpp9XWP6nFT502hiaalBCf5bWbuMAEXTh6UAa6 Oct 11 08:05:23 np0005481012 certmonger[38891]: QsprSOEVCsVBV6xPpxus8sIoj5bKofr1cpQxhUiRrUnM4Txco27FGDdYgpU6CuaQ Oct 11 08:05:23 np0005481012 certmonger[38891]: EtRVeKN0X3RFQsF9dlr+krH1CCCF7Y6jpXb2KEH6+nQgCMNP5z4SPiH1XTxVsoCy Oct 11 08:05:23 np0005481012 certmonger[38891]: 8AaHWknXRey7Q+jTJyB2FCo9DIC9Pv6VxxCysE7NpldUYBtIR02yKPLx2V3qthVF Oct 11 08:05:23 np0005481012 certmonger[38891]: CdrHUVnGaT+sbNVHrVyHN9T+XROzgbRTAJGVLiHUnEno12R2U76F7O04fQb6T6tu Oct 11 08:05:23 np0005481012 certmonger[38891]: 1DetqpbCyUio4KCX0GvWfELtA0UB0Z7t+elhXZJjpKEQ7zsa2feEEk4zdQgzkzff Oct 11 08:05:23 np0005481012 certmonger[38891]: +FCPNv5NWbN5Nn8y+uWE0BWQ6bkhSL3s85vhIUp3WXSUfPuziFaeJlRtuakLu/5U Oct 11 08:05:23 np0005481012 certmonger[38891]: z4v1GynIczsysOraSAVON1+prxIxMIk6qXH6xRptlr3wDmVaPvnm Oct 11 08:05:23 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:05:23 np0005481012 certmonger[38891]: " Oct 11 08:05:23 np0005481012 certmonger[42976]: 2025-10-11 08:05:23 [42976] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:05:23 np0005481012 certmonger[42976]: MIIFYzCCA8ugAwIBAgIBTTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:23 np0005481012 certmonger[42976]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:23 np0005481012 certmonger[42976]: MDUyM1oXDTI3MTAxMjA4MDUyM1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:23 np0005481012 certmonger[42976]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:23 np0005481012 certmonger[42976]: hvcNAQEBBQADggEPADCCAQoCggEBAJo3L6fXo0sfqVRNA52fMXz+XwGnQj8PqPZJ Oct 11 08:05:23 np0005481012 certmonger[42976]: 2kEdifHWQrI3pBzW1PWQSRGEz+zrR0RZmW3TlBFUiSut0ddn6X6fLM3/xYYtPFnA Oct 11 08:05:23 np0005481012 certmonger[42976]: nIvugexUjTvfPBM5LcMDZ/4CeuVv3/V7vEdnFV7RQI+elTiR2+PN5Q3KT/rZKQvr Oct 11 08:05:23 np0005481012 certmonger[42976]: sow98vTEjokzC3PrJuRJXlsy84J2dP1rMXpmXS+kxV9aD4CrvBhhA4KkXdoqbxpT Oct 11 08:05:23 np0005481012 certmonger[42976]: Re6nm4UtFZtAIgQCFuK+qgdXDj6sWvu7pCRB5O4vuhcpYxXWeL0Qy2CWB5Gyzdy0 Oct 11 08:05:23 np0005481012 certmonger[42976]: yYzw4Myy13CRlyu0nZSg0oObazJTJO8k6ki5tKqTTLOwYTUSTl8CAwEAAaOCAfQw Oct 11 08:05:23 np0005481012 certmonger[42976]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:23 np0005481012 certmonger[42976]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:23 np0005481012 certmonger[42976]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:23 np0005481012 certmonger[42976]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:23 np0005481012 certmonger[42976]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:23 np0005481012 certmonger[42976]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFO0UC7DxJOxzc8N57c3ARzgC Oct 11 08:05:23 np0005481012 certmonger[42976]: KIc3MIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:23 np0005481012 certmonger[42976]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5L25wMDAwNTQ4MTAxMi5p Oct 11 08:05:23 np0005481012 certmonger[42976]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:05:23 np0005481012 certmonger[42976]: Ty5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkbIW5wMDAwNTQ4MTAxMi5p Oct 11 08:05:23 np0005481012 certmonger[42976]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEABLhDgwfXY0fG Oct 11 08:05:23 np0005481012 certmonger[42976]: UhqzJRfoMuGkhb13zLNR7VN238Kpp9XWP6nFT502hiaalBCf5bWbuMAEXTh6UAa6 Oct 11 08:05:23 np0005481012 certmonger[42976]: QsprSOEVCsVBV6xPpxus8sIoj5bKofr1cpQxhUiRrUnM4Txco27FGDdYgpU6CuaQ Oct 11 08:05:23 np0005481012 certmonger[42976]: EtRVeKN0X3RFQsF9dlr+krH1CCCF7Y6jpXb2KEH6+nQgCMNP5z4SPiH1XTxVsoCy Oct 11 08:05:23 np0005481012 certmonger[42976]: 8AaHWknXRey7Q+jTJyB2FCo9DIC9Pv6VxxCysE7NpldUYBtIR02yKPLx2V3qthVF Oct 11 08:05:23 np0005481012 certmonger[42976]: CdrHUVnGaT+sbNVHrVyHN9T+XROzgbRTAJGVLiHUnEno12R2U76F7O04fQb6T6tu Oct 11 08:05:23 np0005481012 certmonger[42976]: 1DetqpbCyUio4KCX0GvWfELtA0UB0Z7t+elhXZJjpKEQ7zsa2feEEk4zdQgzkzff Oct 11 08:05:23 np0005481012 certmonger[42976]: +FCPNv5NWbN5Nn8y+uWE0BWQ6bkhSL3s85vhIUp3WXSUfPuziFaeJlRtuakLu/5U Oct 11 08:05:23 np0005481012 certmonger[42976]: z4v1GynIczsysOraSAVON1+prxIxMIk6qXH6xRptlr3wDmVaPvnm Oct 11 08:05:23 np0005481012 certmonger[42976]: -----END CERTIFICATE----- Oct 11 08:05:23 np0005481012 certmonger[42976]: ". Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Certificate submission still ongoing. Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Certificate submission postprocessing complete. Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Child status = 0. Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Child output: Oct 11 08:05:23 np0005481012 certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFYzCCA8ugAwIBAgIBTTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u\nVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4\nMDUyM1oXDTI3MTAxMjA4MDUyM1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV\nBAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI\nhvcNAQEBBQADggEPADCCAQoCggEBAJo3L6fXo0sfqVRNA52fMXz+XwGnQj8PqPZJ\n2kEdifHWQrI3pBzW1PWQSRGEz+zrR0RZmW3TlBFUiSut0ddn6X6fLM3/xYYtPFnA\nnIvugexUjTvfPBM5LcMDZ/4CeuVv3/V7vEdnFV7RQI+elTiR2+PN5Q3KT/rZKQvr\nsow98vTEjokzC3PrJuRJXlsy84J2dP1rMXpmXS+kxV9aD4CrvBhhA4KkXdoqbxpT\nRe6nm4UtFZtAIgQCFuK+qgdXDj6sWvu7pCRB5O4vuhcpYxXWeL0Qy2CWB5Gyzdy0\nyYzw4Myy13CRlyu0nZSg0oObazJTJO8k6ki5tKqTTLOwYTUSTl8CAwEAAaOCAfQw\nggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB\nBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw\nMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw\ncwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js\nL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD\nZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFO0UC7DxJOxzc8N57c3ARzgC\nKIc3MIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u\ndGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5L25wMDAwNTQ4MTAxMi5p\nbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P\nTy5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkbIW5wMDAwNTQ4MTAxMi5p\nbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEABLhDgwfXY0fG\nUhqzJRfoMuGkhb13zLNR7VN238Kpp9XWP6nFT502hiaalBCf5bWbuMAEXTh6UAa6\nQsprSOEVCsVBV6xPpxus8sIoj5bKofr1cpQxhUiRrUnM4Txco27FGDdYgpU6CuaQ\nEtRVeKN0X3RFQsF9dlr+krH1CCCF7Y6jpXb2KEH6+nQgCMNP5z4SPiH1XTxVsoCy\n8AaHWknXRey7Q+jTJyB2FCo9DIC9Pv6VxxCysE7NpldUYBtIR02yKPLx2V3qthVF\nCdrHUVnGaT+sbNVHrVyHN9T+XROzgbRTAJGVLiHUnEno12R2U76F7O04fQb6T6tu\n1DetqpbCyUio4KCX0GvWfELtA0UB0Z7t+elhXZJjpKEQ7zsa2feEEk4zdQgzkzff\n+FCPNv5NWbN5Nn8y+uWE0BWQ6bkhSL3s85vhIUp3WXSUfPuziFaeJlRtuakLu/5U\nz4v1GynIczsysOraSAVON1+prxIxMIk6qXH6xRptlr3wDmVaPvnm\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:05:23 np0005481012 certmonger[38891]: " Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:05:23 np0005481012 certmonger[38891]: MIIFYzCCA8ugAwIBAgIBTTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:23 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:23 np0005481012 certmonger[38891]: MDUyM1oXDTI3MTAxMjA4MDUyM1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:23 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:23 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAJo3L6fXo0sfqVRNA52fMXz+XwGnQj8PqPZJ Oct 11 08:05:23 np0005481012 certmonger[38891]: 2kEdifHWQrI3pBzW1PWQSRGEz+zrR0RZmW3TlBFUiSut0ddn6X6fLM3/xYYtPFnA Oct 11 08:05:23 np0005481012 certmonger[38891]: nIvugexUjTvfPBM5LcMDZ/4CeuVv3/V7vEdnFV7RQI+elTiR2+PN5Q3KT/rZKQvr Oct 11 08:05:23 np0005481012 certmonger[38891]: sow98vTEjokzC3PrJuRJXlsy84J2dP1rMXpmXS+kxV9aD4CrvBhhA4KkXdoqbxpT Oct 11 08:05:23 np0005481012 certmonger[38891]: Re6nm4UtFZtAIgQCFuK+qgdXDj6sWvu7pCRB5O4vuhcpYxXWeL0Qy2CWB5Gyzdy0 Oct 11 08:05:23 np0005481012 certmonger[38891]: yYzw4Myy13CRlyu0nZSg0oObazJTJO8k6ki5tKqTTLOwYTUSTl8CAwEAAaOCAfQw Oct 11 08:05:23 np0005481012 certmonger[38891]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:23 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:23 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:23 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:23 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:23 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFO0UC7DxJOxzc8N57c3ARzgC Oct 11 08:05:23 np0005481012 certmonger[38891]: KIc3MIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:23 np0005481012 certmonger[38891]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5L25wMDAwNTQ4MTAxMi5p Oct 11 08:05:23 np0005481012 certmonger[38891]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:05:23 np0005481012 certmonger[38891]: Ty5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkbIW5wMDAwNTQ4MTAxMi5p Oct 11 08:05:23 np0005481012 certmonger[38891]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEABLhDgwfXY0fG Oct 11 08:05:23 np0005481012 certmonger[38891]: UhqzJRfoMuGkhb13zLNR7VN238Kpp9XWP6nFT502hiaalBCf5bWbuMAEXTh6UAa6 Oct 11 08:05:23 np0005481012 certmonger[38891]: QsprSOEVCsVBV6xPpxus8sIoj5bKofr1cpQxhUiRrUnM4Txco27FGDdYgpU6CuaQ Oct 11 08:05:23 np0005481012 certmonger[38891]: EtRVeKN0X3RFQsF9dlr+krH1CCCF7Y6jpXb2KEH6+nQgCMNP5z4SPiH1XTxVsoCy Oct 11 08:05:23 np0005481012 certmonger[38891]: 8AaHWknXRey7Q+jTJyB2FCo9DIC9Pv6VxxCysE7NpldUYBtIR02yKPLx2V3qthVF Oct 11 08:05:23 np0005481012 certmonger[38891]: CdrHUVnGaT+sbNVHrVyHN9T+XROzgbRTAJGVLiHUnEno12R2U76F7O04fQb6T6tu Oct 11 08:05:23 np0005481012 certmonger[38891]: 1DetqpbCyUio4KCX0GvWfELtA0UB0Z7t+elhXZJjpKEQ7zsa2feEEk4zdQgzkzff Oct 11 08:05:23 np0005481012 certmonger[38891]: +FCPNv5NWbN5Nn8y+uWE0BWQ6bkhSL3s85vhIUp3WXSUfPuziFaeJlRtuakLu/5U Oct 11 08:05:23 np0005481012 certmonger[38891]: z4v1GynIczsysOraSAVON1+prxIxMIk6qXH6xRptlr3wDmVaPvnm Oct 11 08:05:23 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:05:23 np0005481012 certmonger[38891]: ". Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] No hooks set for pre-save command. Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:23 np0005481012 certmonger[38891]: 2025-10-11 08:05:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:24 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:05:24 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:05:24 np0005481012 certmonger[38891]: 2025-10-11 08:05:24 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:24 np0005481012 certmonger[38891]: 2025-10-11 08:05:24 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:24 np0005481012 certmonger[43050]: Certificate in file "/etc/pki/tls/certs/novnc-proxy.crt" issued by CA and saved. Oct 11 08:05:24 np0005481012 certmonger[38891]: 2025-10-11 08:05:24 [38891] Wrote to /var/lib/certmonger/requests/20251011080523 Oct 11 08:05:25 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:05:25 np0005481012 python3[43066]: ansible-ansible.builtin.service_facts Invoked Oct 11 08:05:25 np0005481012 network[43083]: You are using 'network' service provided by 'network-scripts', which are now deprecated. Oct 11 08:05:25 np0005481012 network[43084]: 'network-scripts' will be removed from distribution in near future. Oct 11 08:05:25 np0005481012 network[43085]: It is advised to switch to 'NetworkManager' instead for network management. Oct 11 08:05:26 np0005481012 systemd[1]: /usr/lib/systemd/system/insights-client.service:23: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 08:05:29 np0005481012 python3[43203]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:05:29 np0005481012 python3[43223]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:05:33 np0005481012 python3[43240]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:05:37 np0005481012 python3[43257]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:05:37 np0005481012 python3[43273]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:05:38 np0005481012 python3[43289]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:05:38 np0005481012 python3[43307]: ansible-certificate_request Invoked with name=ovn_dbs dns=['np0005481012.internalapi.ooo.test'] principal=['ovn_dbs/np0005481012.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Oct 11 08:05:38 np0005481012 certmonger[38891]: 2025-10-11 08:05:38 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481012 certmonger[38891]: 2025-10-11 08:05:38 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481012 certmonger[38891]: 2025-10-11 08:05:38 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481012 certmonger[38891]: 2025-10-11 08:05:38 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481012 certmonger[38891]: 2025-10-11 08:05:38 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481012 certmonger[38891]: 2025-10-11 08:05:38 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481012 certmonger[38891]: 2025-10-11 08:05:38 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481012 certmonger[38891]: 2025-10-11 08:05:38 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481012 certmonger[38891]: 2025-10-11 08:05:38 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[43317]: 2025-10-11 08:05:39 [43317] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481012.internalapi.ooo.test" for child. Oct 11 08:05:39 np0005481012 certmonger[43317]: 2025-10-11 08:05:39 [43317] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481012.internalapi.ooo.test Oct 11 08:05:39 np0005481012 certmonger[43317]: " for child. Oct 11 08:05:39 np0005481012 certmonger[43317]: 2025-10-11 08:05:39 [43317] Setting "CERTMONGER_REQ_PRINCIPAL" to "ovn_dbs/np0005481012.internalapi.ooo.test@OOO.TEST Oct 11 08:05:39 np0005481012 certmonger[43317]: " for child. Oct 11 08:05:39 np0005481012 certmonger[43317]: 2025-10-11 08:05:39 [43317] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:05:39 np0005481012 certmonger[43317]: 2025-10-11 08:05:39 [43317] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:05:39 np0005481012 certmonger[43317]: MIID2DCCAsACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDEyLmludGVybmFsYXBp Oct 11 08:05:39 np0005481012 certmonger[43317]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmXEnM4yF Oct 11 08:05:39 np0005481012 certmonger[43317]: BfdhoaBWrGNZ7GDd1g0Fa5Y3eyLtlUcSDjhf3nCmUrDQBTHO5nJj236u8KWtV0YV Oct 11 08:05:39 np0005481012 certmonger[43317]: JA4DoVs/A4khNWQZCRxHMvVESV3d6xLJ3khc/mmXq+8aNBY/Qte5tcbpk1dDe69o Oct 11 08:05:39 np0005481012 certmonger[43317]: p9/iP9cgGBGeG2Bo1IV403sY053s9cM8Vs0aFK8GNMOpljPZSVYTkGgEV/fo+uPO Oct 11 08:05:39 np0005481012 certmonger[43317]: V7N/buFaLBERuv0I3nXann5CW2KBp5VTl/ysIcGyU6qVuDTw760fAHim8Idz3Iqq Oct 11 08:05:39 np0005481012 certmonger[43317]: rFTITuXnl+aVboWJGNq/Gbope5UcH0ksr+ZZgYn9HtFzZSzUp4Z4vM4sfezkcMdn Oct 11 08:05:39 np0005481012 certmonger[43317]: Tkbj5hQb6C/fxQIDAQABoIIBZTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:05:39 np0005481012 certmonger[43317]: ADEAMQAwADgAMAA1ADMAODCCATQGCSqGSIb3DQEJDjGCASUwggEhMAsGA1UdDwQE Oct 11 08:05:39 np0005481012 certmonger[43317]: AwIFoDCBxQYDVR0RBIG9MIG6giFucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29v Oct 11 08:05:39 np0005481012 certmonger[43317]: LnRlc3SgQgYKKwYBBAGCNxQCA6A0DDJvdm5fZGJzL25wMDAwNTQ4MTAxMi5pbnRl Oct 11 08:05:39 np0005481012 certmonger[43317]: cm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBRBgYrBgEFAgKgRzBFoAobCE9PTy5U Oct 11 08:05:39 np0005481012 certmonger[43317]: RVNUoTcwNaADAgEBoS4wLBsHb3ZuX2RicxshbnAwMDA1NDgxMDEyLmludGVybmFs Oct 11 08:05:39 np0005481012 certmonger[43317]: YXBpLm9vby50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNV Oct 11 08:05:39 np0005481012 certmonger[43317]: HRMBAf8EAjAAMB0GA1UdDgQWBBTSKmyoizD3LP4wCwm4RabH7w7pzTANBgkqhkiG Oct 11 08:05:39 np0005481012 certmonger[43317]: 9w0BAQsFAAOCAQEAeyPTtAlstzOgCaGdJsVQzVX+2f0S8Eq54YMjc00/m8W9W5rC Oct 11 08:05:39 np0005481012 certmonger[43317]: ib6GGDCdlRNM9VPjbf6ehacKjucORBfd9bCscI3eIJkRIwdBAcqtGCDN7Hzxw9Rc Oct 11 08:05:39 np0005481012 certmonger[43317]: RGMUhKG0oo7vH7Xin8jJ2ZPTNaipGGS64nsJvtDeRypCQMIqLs/V593VdHJKxa7Z Oct 11 08:05:39 np0005481012 certmonger[43317]: lE8mWY+l1gZi64KnU66XYHVSOK4tvYcwB/KXDZSEaseW6Xu1Ewm/MLBT6J1JRzZg Oct 11 08:05:39 np0005481012 certmonger[43317]: dqQA/ZNn3n1QFx+q1rXa7RAr+0JZLnBC/M94pNBK4co9drZzdAFbivk+8L7FE3Et Oct 11 08:05:39 np0005481012 certmonger[43317]: IwuFRYUHjufVKdWG6jlP4zpmDsP2Jy03P4P/ng== Oct 11 08:05:39 np0005481012 certmonger[43317]: -----END CERTIFICATE REQUEST----- Oct 11 08:05:39 np0005481012 certmonger[43317]: " for child. Oct 11 08:05:39 np0005481012 certmonger[43317]: 2025-10-11 08:05:39 [43317] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:05:39 np0005481012 certmonger[43317]: 2025-10-11 08:05:39 [43317] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmXEnM4yFBfdhoaBWrGNZ7GDd1g0Fa5Y3eyLtlUcSDjhf3nCmUrDQBTHO5nJj236u8KWtV0YVJA4DoVs/A4khNWQZCRxHMvVESV3d6xLJ3khc/mmXq+8aNBY/Qte5tcbpk1dDe69op9/iP9cgGBGeG2Bo1IV403sY053s9cM8Vs0aFK8GNMOpljPZSVYTkGgEV/fo+uPOV7N/buFaLBERuv0I3nXann5CW2KBp5VTl/ysIcGyU6qVuDTw760fAHim8Idz3IqqrFTITuXnl+aVboWJGNq/Gbope5UcH0ksr+ZZgYn9HtFzZSzUp4Z4vM4sfezkcMdnTkbj5hQb6C/fxQIDAQAB" for child. Oct 11 08:05:39 np0005481012 certmonger[43317]: 2025-10-11 08:05:39 [43317] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:05:39 np0005481012 certmonger[43317]: 2025-10-11 08:05:39 [43317] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:05:39 np0005481012 certmonger[43317]: 2025-10-11 08:05:39 [43317] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:05:39 np0005481012 certmonger[43317]: 2025-10-11 08:05:39 [43317] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:05:39 np0005481012 certmonger[43317]: 2025-10-11 08:05:39 [43317] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[43317]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:05:39 np0005481012 certmonger[43317]: Certificate: "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" Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Certificate submission still ongoing. Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Certificate submission attempt complete. Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Child status = 0. Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Child output: Oct 11 08:05:39 np0005481012 certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 08:05:39 np0005481012 certmonger[38891]: MIIFWzCCA8OgAwIBAgIBUTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:39 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:39 np0005481012 certmonger[38891]: MDUzOVoXDTI3MTAxMjA4MDUzOVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:39 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:39 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAJlxJzOMhQX3YaGgVqxjWexg3dYNBWuWN3si Oct 11 08:05:39 np0005481012 certmonger[38891]: 7ZVHEg44X95wplKw0AUxzuZyY9t+rvClrVdGFSQOA6FbPwOJITVkGQkcRzL1REld Oct 11 08:05:39 np0005481012 certmonger[38891]: 3esSyd5IXP5pl6vvGjQWP0LXubXG6ZNXQ3uvaKff4j/XIBgRnhtgaNSFeNN7GNOd Oct 11 08:05:39 np0005481012 certmonger[38891]: 7PXDPFbNGhSvBjTDqZYz2UlWE5BoBFf36Prjzlezf27hWiwREbr9CN512p5+Qlti Oct 11 08:05:39 np0005481012 certmonger[38891]: gaeVU5f8rCHBslOqlbg08O+tHwB4pvCHc9yKqqxUyE7l55fmlW6FiRjavxm6KXuV Oct 11 08:05:39 np0005481012 certmonger[38891]: HB9JLK/mWYGJ/R7Rc2Us1KeGeLzOLH3s5HDHZ05G4+YUG+gv38UCAwEAAaOCAeww Oct 11 08:05:39 np0005481012 certmonger[38891]: ggHoMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:39 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:39 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:39 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:39 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:39 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLDxwV5QMJcUL7NpW97jzNcn Oct 11 08:05:39 np0005481012 certmonger[38891]: jYy1MIHFBgNVHREEgb0wgbqCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:39 np0005481012 certmonger[38891]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMm92bl9kYnMvbnAwMDA1NDgxMDEyLmludGVy Oct 11 08:05:39 np0005481012 certmonger[38891]: bmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Oct 11 08:05:39 np0005481012 certmonger[38891]: U1ShNzA1oAMCAQGhLjAsGwdvdm5fZGJzGyFucDAwMDU0ODEwMTIuaW50ZXJuYWxh Oct 11 08:05:39 np0005481012 certmonger[38891]: cGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBADMveh7aHMcH90TIOWzBgvDc Oct 11 08:05:39 np0005481012 certmonger[38891]: GD3Jzc0sHlD+PIT+1bZZ8nvYqJorQchuZEkQEMku+yu48OzwQ95gwUCytVHlxsEh Oct 11 08:05:39 np0005481012 certmonger[38891]: GJ7OKFEI0uhsjvq4ZoERg5HKURINd4qTwuGVjqxBM3trzwa1GwelourhmuyqsNpy Oct 11 08:05:39 np0005481012 certmonger[38891]: 46EmJRh6qpFzFUxVKzy4PXEpMs/yuMEEvuFNcqaLA0115sm5TjBFXh5+VJE72xf7 Oct 11 08:05:39 np0005481012 certmonger[38891]: 1ojobEzLoeDba79EvmMCAEsZ3AA6dd6QLvRLmqV4IS+YadDe+em4+l5Q4c6UpsNM Oct 11 08:05:39 np0005481012 certmonger[38891]: G/3L0yV/7efU+/wX8QXhfp14ziYnaqbZGMvnXsJw/+JNxn/qATzsREN0sGs5D7yD Oct 11 08:05:39 np0005481012 certmonger[38891]: QNpznG7iIJxudtN3540o5cGuUOLx0mV74GaEoWCLwBEEQfGFrVZ14bhQs0aIQaN1 Oct 11 08:05:39 np0005481012 certmonger[38891]: twEp6izcQyBeZuhMR1YFAayc8y2RZCd2PvodGxwYX5IvIqBcKiWXL/Ksi4EBeihE Oct 11 08:05:39 np0005481012 certmonger[38891]: jCRZ9D6ZFO/hS6yY2k8GSsVyq2aTvHbu/I7/WqWMFw== Oct 11 08:05:39 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:05:39 np0005481012 certmonger[38891]: " Oct 11 08:05:39 np0005481012 certmonger[43319]: 2025-10-11 08:05:39 [43319] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:05:39 np0005481012 certmonger[43319]: MIIFWzCCA8OgAwIBAgIBUTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:39 np0005481012 certmonger[43319]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:39 np0005481012 certmonger[43319]: MDUzOVoXDTI3MTAxMjA4MDUzOVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:39 np0005481012 certmonger[43319]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:39 np0005481012 certmonger[43319]: hvcNAQEBBQADggEPADCCAQoCggEBAJlxJzOMhQX3YaGgVqxjWexg3dYNBWuWN3si Oct 11 08:05:39 np0005481012 certmonger[43319]: 7ZVHEg44X95wplKw0AUxzuZyY9t+rvClrVdGFSQOA6FbPwOJITVkGQkcRzL1REld Oct 11 08:05:39 np0005481012 certmonger[43319]: 3esSyd5IXP5pl6vvGjQWP0LXubXG6ZNXQ3uvaKff4j/XIBgRnhtgaNSFeNN7GNOd Oct 11 08:05:39 np0005481012 certmonger[43319]: 7PXDPFbNGhSvBjTDqZYz2UlWE5BoBFf36Prjzlezf27hWiwREbr9CN512p5+Qlti Oct 11 08:05:39 np0005481012 certmonger[43319]: gaeVU5f8rCHBslOqlbg08O+tHwB4pvCHc9yKqqxUyE7l55fmlW6FiRjavxm6KXuV Oct 11 08:05:39 np0005481012 certmonger[43319]: HB9JLK/mWYGJ/R7Rc2Us1KeGeLzOLH3s5HDHZ05G4+YUG+gv38UCAwEAAaOCAeww Oct 11 08:05:39 np0005481012 certmonger[43319]: ggHoMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:39 np0005481012 certmonger[43319]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:39 np0005481012 certmonger[43319]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:39 np0005481012 certmonger[43319]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:39 np0005481012 certmonger[43319]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:39 np0005481012 certmonger[43319]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLDxwV5QMJcUL7NpW97jzNcn Oct 11 08:05:39 np0005481012 certmonger[43319]: jYy1MIHFBgNVHREEgb0wgbqCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:39 np0005481012 certmonger[43319]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMm92bl9kYnMvbnAwMDA1NDgxMDEyLmludGVy Oct 11 08:05:39 np0005481012 certmonger[43319]: bmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Oct 11 08:05:39 np0005481012 certmonger[43319]: U1ShNzA1oAMCAQGhLjAsGwdvdm5fZGJzGyFucDAwMDU0ODEwMTIuaW50ZXJuYWxh Oct 11 08:05:39 np0005481012 certmonger[43319]: cGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBADMveh7aHMcH90TIOWzBgvDc Oct 11 08:05:39 np0005481012 certmonger[43319]: GD3Jzc0sHlD+PIT+1bZZ8nvYqJorQchuZEkQEMku+yu48OzwQ95gwUCytVHlxsEh Oct 11 08:05:39 np0005481012 certmonger[43319]: GJ7OKFEI0uhsjvq4ZoERg5HKURINd4qTwuGVjqxBM3trzwa1GwelourhmuyqsNpy Oct 11 08:05:39 np0005481012 certmonger[43319]: 46EmJRh6qpFzFUxVKzy4PXEpMs/yuMEEvuFNcqaLA0115sm5TjBFXh5+VJE72xf7 Oct 11 08:05:39 np0005481012 certmonger[43319]: 1ojobEzLoeDba79EvmMCAEsZ3AA6dd6QLvRLmqV4IS+YadDe+em4+l5Q4c6UpsNM Oct 11 08:05:39 np0005481012 certmonger[43319]: G/3L0yV/7efU+/wX8QXhfp14ziYnaqbZGMvnXsJw/+JNxn/qATzsREN0sGs5D7yD Oct 11 08:05:39 np0005481012 certmonger[43319]: QNpznG7iIJxudtN3540o5cGuUOLx0mV74GaEoWCLwBEEQfGFrVZ14bhQs0aIQaN1 Oct 11 08:05:39 np0005481012 certmonger[43319]: twEp6izcQyBeZuhMR1YFAayc8y2RZCd2PvodGxwYX5IvIqBcKiWXL/Ksi4EBeihE Oct 11 08:05:39 np0005481012 certmonger[43319]: jCRZ9D6ZFO/hS6yY2k8GSsVyq2aTvHbu/I7/WqWMFw== Oct 11 08:05:39 np0005481012 certmonger[43319]: -----END CERTIFICATE----- Oct 11 08:05:39 np0005481012 certmonger[43319]: ". Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Certificate submission still ongoing. Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Certificate submission postprocessing complete. Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Child status = 0. Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Child output: Oct 11 08:05:39 np0005481012 certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFWzCCA8OgAwIBAgIBUTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u\nVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4\nMDUzOVoXDTI3MTAxMjA4MDUzOVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV\nBAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI\nhvcNAQEBBQADggEPADCCAQoCggEBAJlxJzOMhQX3YaGgVqxjWexg3dYNBWuWN3si\n7ZVHEg44X95wplKw0AUxzuZyY9t+rvClrVdGFSQOA6FbPwOJITVkGQkcRzL1REld\n3esSyd5IXP5pl6vvGjQWP0LXubXG6ZNXQ3uvaKff4j/XIBgRnhtgaNSFeNN7GNOd\n7PXDPFbNGhSvBjTDqZYz2UlWE5BoBFf36Prjzlezf27hWiwREbr9CN512p5+Qlti\ngaeVU5f8rCHBslOqlbg08O+tHwB4pvCHc9yKqqxUyE7l55fmlW6FiRjavxm6KXuV\nHB9JLK/mWYGJ/R7Rc2Us1KeGeLzOLH3s5HDHZ05G4+YUG+gv38UCAwEAAaOCAeww\nggHoMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB\nBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw\nMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw\ncwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js\nL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD\nZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLDxwV5QMJcUL7NpW97jzNcn\njYy1MIHFBgNVHREEgb0wgbqCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u\ndGVzdKBCBgorBgEEAYI3FAIDoDQMMm92bl9kYnMvbnAwMDA1NDgxMDEyLmludGVy\nbmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF\nU1ShNzA1oAMCAQGhLjAsGwdvdm5fZGJzGyFucDAwMDU0ODEwMTIuaW50ZXJuYWxh\ncGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBADMveh7aHMcH90TIOWzBgvDc\nGD3Jzc0sHlD+PIT+1bZZ8nvYqJorQchuZEkQEMku+yu48OzwQ95gwUCytVHlxsEh\nGJ7OKFEI0uhsjvq4ZoERg5HKURINd4qTwuGVjqxBM3trzwa1GwelourhmuyqsNpy\n46EmJRh6qpFzFUxVKzy4PXEpMs/yuMEEvuFNcqaLA0115sm5TjBFXh5+VJE72xf7\n1ojobEzLoeDba79EvmMCAEsZ3AA6dd6QLvRLmqV4IS+YadDe+em4+l5Q4c6UpsNM\nG/3L0yV/7efU+/wX8QXhfp14ziYnaqbZGMvnXsJw/+JNxn/qATzsREN0sGs5D7yD\nQNpznG7iIJxudtN3540o5cGuUOLx0mV74GaEoWCLwBEEQfGFrVZ14bhQs0aIQaN1\ntwEp6izcQyBeZuhMR1YFAayc8y2RZCd2PvodGxwYX5IvIqBcKiWXL/Ksi4EBeihE\njCRZ9D6ZFO/hS6yY2k8GSsVyq2aTvHbu/I7/WqWMFw==\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:05:39 np0005481012 certmonger[38891]: " Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:05:39 np0005481012 certmonger[38891]: MIIFWzCCA8OgAwIBAgIBUTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:39 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:39 np0005481012 certmonger[38891]: MDUzOVoXDTI3MTAxMjA4MDUzOVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:39 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:39 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAJlxJzOMhQX3YaGgVqxjWexg3dYNBWuWN3si Oct 11 08:05:39 np0005481012 certmonger[38891]: 7ZVHEg44X95wplKw0AUxzuZyY9t+rvClrVdGFSQOA6FbPwOJITVkGQkcRzL1REld Oct 11 08:05:39 np0005481012 certmonger[38891]: 3esSyd5IXP5pl6vvGjQWP0LXubXG6ZNXQ3uvaKff4j/XIBgRnhtgaNSFeNN7GNOd Oct 11 08:05:39 np0005481012 certmonger[38891]: 7PXDPFbNGhSvBjTDqZYz2UlWE5BoBFf36Prjzlezf27hWiwREbr9CN512p5+Qlti Oct 11 08:05:39 np0005481012 certmonger[38891]: gaeVU5f8rCHBslOqlbg08O+tHwB4pvCHc9yKqqxUyE7l55fmlW6FiRjavxm6KXuV Oct 11 08:05:39 np0005481012 certmonger[38891]: HB9JLK/mWYGJ/R7Rc2Us1KeGeLzOLH3s5HDHZ05G4+YUG+gv38UCAwEAAaOCAeww Oct 11 08:05:39 np0005481012 certmonger[38891]: ggHoMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:39 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:39 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:39 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:39 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:39 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLDxwV5QMJcUL7NpW97jzNcn Oct 11 08:05:39 np0005481012 certmonger[38891]: jYy1MIHFBgNVHREEgb0wgbqCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:39 np0005481012 certmonger[38891]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMm92bl9kYnMvbnAwMDA1NDgxMDEyLmludGVy Oct 11 08:05:39 np0005481012 certmonger[38891]: bmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Oct 11 08:05:39 np0005481012 certmonger[38891]: U1ShNzA1oAMCAQGhLjAsGwdvdm5fZGJzGyFucDAwMDU0ODEwMTIuaW50ZXJuYWxh Oct 11 08:05:39 np0005481012 certmonger[38891]: cGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBADMveh7aHMcH90TIOWzBgvDc Oct 11 08:05:39 np0005481012 certmonger[38891]: GD3Jzc0sHlD+PIT+1bZZ8nvYqJorQchuZEkQEMku+yu48OzwQ95gwUCytVHlxsEh Oct 11 08:05:39 np0005481012 certmonger[38891]: GJ7OKFEI0uhsjvq4ZoERg5HKURINd4qTwuGVjqxBM3trzwa1GwelourhmuyqsNpy Oct 11 08:05:39 np0005481012 certmonger[38891]: 46EmJRh6qpFzFUxVKzy4PXEpMs/yuMEEvuFNcqaLA0115sm5TjBFXh5+VJE72xf7 Oct 11 08:05:39 np0005481012 certmonger[38891]: 1ojobEzLoeDba79EvmMCAEsZ3AA6dd6QLvRLmqV4IS+YadDe+em4+l5Q4c6UpsNM Oct 11 08:05:39 np0005481012 certmonger[38891]: G/3L0yV/7efU+/wX8QXhfp14ziYnaqbZGMvnXsJw/+JNxn/qATzsREN0sGs5D7yD Oct 11 08:05:39 np0005481012 certmonger[38891]: QNpznG7iIJxudtN3540o5cGuUOLx0mV74GaEoWCLwBEEQfGFrVZ14bhQs0aIQaN1 Oct 11 08:05:39 np0005481012 certmonger[38891]: twEp6izcQyBeZuhMR1YFAayc8y2RZCd2PvodGxwYX5IvIqBcKiWXL/Ksi4EBeihE Oct 11 08:05:39 np0005481012 certmonger[38891]: jCRZ9D6ZFO/hS6yY2k8GSsVyq2aTvHbu/I7/WqWMFw== Oct 11 08:05:39 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:05:39 np0005481012 certmonger[38891]: ". Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] No hooks set for pre-save command. Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] No hooks set for post-save command. Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481012 certmonger[43323]: Certificate in file "/etc/pki/tls/certs/ovn_dbs.crt" issued by CA and saved. Oct 11 08:05:39 np0005481012 certmonger[38891]: 2025-10-11 08:05:39 [38891] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:40 np0005481012 python3[43339]: ansible-ansible.builtin.file Invoked with path=/var/lib/config-data/ansible-generated/ovn/etc/sysconfig recurse=True state=directory selevel=s0 setype=container_file_t force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Oct 11 08:05:40 np0005481012 python3[43355]: ansible-ansible.legacy.command Invoked with _raw_params=ovsdb-tool --help|grep -q election-timer _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:05:41 np0005481012 python3[43406]: ansible-ansible.legacy.stat Invoked with path=/var/lib/config-data/ansible-generated/ovn/etc/sysconfig/ovn_cluster follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 08:05:41 np0005481012 python3[43449]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169940.8765292-113209-201249040909550/source dest=/var/lib/config-data/ansible-generated/ovn/etc/sysconfig/ovn_cluster mode=640 selevel=s0 setype=container_file_t follow=False _original_basename=ovn_cluster.j2 checksum=9de557d4e92b17001042d27d7011fc7f41497a92 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None attributes=None Oct 11 08:05:42 np0005481012 python3[43479]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active --quiet tripleo_cluster_north_db_server _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:05:42 np0005481012 python3[43496]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active --quiet tripleo_cluster_south_db_server _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:05:43 np0005481012 python3[43513]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active --quiet tripleo_cluster_northd _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:05:44 np0005481012 python3[43530]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:05:44 np0005481012 python3[43550]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:05:48 np0005481012 python3[43567]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:05:51 np0005481012 python3[43584]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:05:51 np0005481012 python3[43600]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:05:52 np0005481012 python3[43616]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:05:53 np0005481012 python3[43634]: ansible-certificate_request Invoked with name=ovn_controller dns=['np0005481012.internalapi.ooo.test'] principal=['ovn_controller/np0005481012.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Oct 11 08:05:53 np0005481012 certmonger[38891]: 2025-10-11 08:05:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:53 np0005481012 certmonger[38891]: 2025-10-11 08:05:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:53 np0005481012 certmonger[38891]: 2025-10-11 08:05:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:53 np0005481012 certmonger[38891]: 2025-10-11 08:05:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:53 np0005481012 certmonger[38891]: 2025-10-11 08:05:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:53 np0005481012 certmonger[38891]: 2025-10-11 08:05:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:53 np0005481012 certmonger[38891]: 2025-10-11 08:05:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:53 np0005481012 certmonger[38891]: 2025-10-11 08:05:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:53 np0005481012 certmonger[38891]: 2025-10-11 08:05:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:53 np0005481012 certmonger[38891]: 2025-10-11 08:05:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:53 np0005481012 certmonger[38891]: 2025-10-11 08:05:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:53 np0005481012 certmonger[38891]: 2025-10-11 08:05:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:53 np0005481012 certmonger[38891]: 2025-10-11 08:05:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:53 np0005481012 certmonger[38891]: 2025-10-11 08:05:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:53 np0005481012 certmonger[38891]: 2025-10-11 08:05:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:53 np0005481012 certmonger[38891]: 2025-10-11 08:05:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:53 np0005481012 certmonger[38891]: 2025-10-11 08:05:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:53 np0005481012 certmonger[43644]: 2025-10-11 08:05:53 [43644] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481012.internalapi.ooo.test" for child. Oct 11 08:05:53 np0005481012 certmonger[43644]: 2025-10-11 08:05:53 [43644] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481012.internalapi.ooo.test Oct 11 08:05:53 np0005481012 certmonger[43644]: " for child. Oct 11 08:05:53 np0005481012 certmonger[43644]: 2025-10-11 08:05:53 [43644] Setting "CERTMONGER_REQ_PRINCIPAL" to "ovn_controller/np0005481012.internalapi.ooo.test@OOO.TEST Oct 11 08:05:53 np0005481012 certmonger[43644]: " for child. Oct 11 08:05:53 np0005481012 certmonger[43644]: 2025-10-11 08:05:53 [43644] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:05:53 np0005481012 certmonger[43644]: 2025-10-11 08:05:53 [43644] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:05:53 np0005481012 certmonger[43644]: MIID5jCCAs4CAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDEyLmludGVybmFsYXBp Oct 11 08:05:53 np0005481012 certmonger[43644]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3IeQJPYa Oct 11 08:05:53 np0005481012 certmonger[43644]: 3qtb9ahD2MWvo0Bq96PjaMUanwx18HZGNcJ1oivKTeJGpPaXSkbrGgf3GqIYnbfh Oct 11 08:05:53 np0005481012 certmonger[43644]: xvORb40rr7c31g7N5yGwZLo9H9VEw8Qz/SS0HFqkruZhlQNTs5S1pJgp79sGa/k3 Oct 11 08:05:53 np0005481012 certmonger[43644]: EQRrDmHyAJwNAtyM7qvrDG1R2vBNy+aDWg6LoOMmg7qESeWB7gw6TlXKxeKG5bEE Oct 11 08:05:53 np0005481012 certmonger[43644]: vUWb+QVl2rjqGOHKo79rsWSapAKL6x+p2LSej3L1DsCosSh5pGTZgnT3hrAMU7jA Oct 11 08:05:53 np0005481012 certmonger[43644]: u3uXH2+QU0rdD+f0g4irpwQ+38UZMopERCvbVlfUAczgg9i9ko47RzpOhdjikGHE Oct 11 08:05:53 np0005481012 certmonger[43644]: /MIwt68dSgqaiwIDAQABoIIBczArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:05:53 np0005481012 certmonger[43644]: ADEAMQAwADgAMAA1ADUAMzCCAUIGCSqGSIb3DQEJDjGCATMwggEvMAsGA1UdDwQE Oct 11 08:05:53 np0005481012 certmonger[43644]: AwIFoDCB0wYDVR0RBIHLMIHIgiFucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29v Oct 11 08:05:53 np0005481012 certmonger[43644]: LnRlc3SgSQYKKwYBBAGCNxQCA6A7DDlvdm5fY29udHJvbGxlci9ucDAwMDU0ODEw Oct 11 08:05:53 np0005481012 certmonger[43644]: MTIuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgWAYGKwYBBQICoE4wTKAK Oct 11 08:05:53 np0005481012 certmonger[43644]: GwhPT08uVEVTVKE+MDygAwIBAaE1MDMbDm92bl9jb250cm9sbGVyGyFucDAwMDU0 Oct 11 08:05:53 np0005481012 certmonger[43644]: ODEwMTIuaW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEG Oct 11 08:05:53 np0005481012 certmonger[43644]: CCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFJeS0iVBlhaOtBMT6ioF Oct 11 08:05:53 np0005481012 certmonger[43644]: /slXn1dQMA0GCSqGSIb3DQEBCwUAA4IBAQDAOMlZVhoERHbFHDirJPoNaZrcnZAC Oct 11 08:05:53 np0005481012 certmonger[43644]: tFAHJsJYBL/Fc+4e1tVMEGlXju3aAycilNoytArANHw4EBrxrOCUJ6NO+C3sBmrc Oct 11 08:05:53 np0005481012 certmonger[43644]: TF+vUx9RrrfY7ncHoFFkWP0RQgobL1rlkFN4cNeJ1mbpGW1bkwVjjbh/t+1HwDmY Oct 11 08:05:53 np0005481012 certmonger[43644]: eAVdiMDXzAOA+sCjKz5jZyfi0Gmf5TiKW0h2wubV0PHmh06bJLGyDdYKFphQf8j0 Oct 11 08:05:53 np0005481012 certmonger[43644]: K4YHLg7U8hwnkXwJJiKIeb6qeKfFkQa8mWiU2BFHdCdT7C65V61kuFEVupzI6Q1h Oct 11 08:05:53 np0005481012 certmonger[43644]: a5u2zRTcQaUR3KUG1uAb9rm+/UB4ECTOOACjfl8iiXGjV/Bf0F0CXNLT Oct 11 08:05:53 np0005481012 certmonger[43644]: -----END CERTIFICATE REQUEST----- Oct 11 08:05:53 np0005481012 certmonger[43644]: " for child. Oct 11 08:05:53 np0005481012 certmonger[43644]: 2025-10-11 08:05:53 [43644] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:05:53 np0005481012 certmonger[43644]: 2025-10-11 08:05:53 [43644] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3IeQJPYa3qtb9ahD2MWvo0Bq96PjaMUanwx18HZGNcJ1oivKTeJGpPaXSkbrGgf3GqIYnbfhxvORb40rr7c31g7N5yGwZLo9H9VEw8Qz/SS0HFqkruZhlQNTs5S1pJgp79sGa/k3EQRrDmHyAJwNAtyM7qvrDG1R2vBNy+aDWg6LoOMmg7qESeWB7gw6TlXKxeKG5bEEvUWb+QVl2rjqGOHKo79rsWSapAKL6x+p2LSej3L1DsCosSh5pGTZgnT3hrAMU7jAu3uXH2+QU0rdD+f0g4irpwQ+38UZMopERCvbVlfUAczgg9i9ko47RzpOhdjikGHE/MIwt68dSgqaiwIDAQAB" for child. Oct 11 08:05:53 np0005481012 certmonger[43644]: 2025-10-11 08:05:53 [43644] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:05:53 np0005481012 certmonger[43644]: 2025-10-11 08:05:53 [43644] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:05:53 np0005481012 certmonger[43644]: 2025-10-11 08:05:53 [43644] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:05:53 np0005481012 certmonger[43644]: 2025-10-11 08:05:53 [43644] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:05:53 np0005481012 certmonger[43644]: 2025-10-11 08:05:53 [43644] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:05:53 np0005481012 certmonger[38891]: 2025-10-11 08:05:53 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:53 np0005481012 certmonger[43644]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:05:54 np0005481012 certmonger[43644]: Certificate: "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" Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Certificate submission still ongoing. Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Certificate submission attempt complete. Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Child status = 0. Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Child output: Oct 11 08:05:54 np0005481012 certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 08:05:54 np0005481012 certmonger[38891]: MIIFaTCCA9GgAwIBAgIBUzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:54 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:54 np0005481012 certmonger[38891]: MDU1NFoXDTI3MTAxMjA4MDU1NFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:54 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:54 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBANyHkCT2Gt6rW/WoQ9jFr6NAavej42jFGp8M Oct 11 08:05:54 np0005481012 certmonger[38891]: dfB2RjXCdaIryk3iRqT2l0pG6xoH9xqiGJ234cbzkW+NK6+3N9YOzechsGS6PR/V Oct 11 08:05:54 np0005481012 certmonger[38891]: RMPEM/0ktBxapK7mYZUDU7OUtaSYKe/bBmv5NxEEaw5h8gCcDQLcjO6r6wxtUdrw Oct 11 08:05:54 np0005481012 certmonger[38891]: Tcvmg1oOi6DjJoO6hEnlge4MOk5VysXihuWxBL1Fm/kFZdq46hjhyqO/a7FkmqQC Oct 11 08:05:54 np0005481012 certmonger[38891]: i+sfqdi0no9y9Q7AqLEoeaRk2YJ094awDFO4wLt7lx9vkFNK3Q/n9IOIq6cEPt/F Oct 11 08:05:54 np0005481012 certmonger[38891]: GTKKREQr21ZX1AHM4IPYvZKOO0c6ToXY4pBhxPzCMLevHUoKmosCAwEAAaOCAfow Oct 11 08:05:54 np0005481012 certmonger[38891]: ggH2MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:54 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:54 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:54 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:54 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:54 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJAvOvXyTC6bfjC95a/zHGxu Oct 11 08:05:54 np0005481012 certmonger[38891]: WDOcMIHTBgNVHREEgcswgciCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:54 np0005481012 certmonger[38891]: dGVzdKBJBgorBgEEAYI3FAIDoDsMOW92bl9jb250cm9sbGVyL25wMDAwNTQ4MTAx Oct 11 08:05:54 np0005481012 certmonger[38891]: Mi5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBYBgYrBgEFAgKgTjBMoAob Oct 11 08:05:54 np0005481012 certmonger[38891]: CE9PTy5URVNUoT4wPKADAgEBoTUwMxsOb3ZuX2NvbnRyb2xsZXIbIW5wMDAwNTQ4 Oct 11 08:05:54 np0005481012 certmonger[38891]: MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAhztK Oct 11 08:05:54 np0005481012 certmonger[38891]: Ac6/1nMoYGN2Os35U2N9Vy0MmL2Y34IIFXUNR7AIgnPPras8f2c13Z8Q1VdRtXJ5 Oct 11 08:05:54 np0005481012 certmonger[38891]: re8QoFM5x3lU4+uPT/FRygU5rosG5FoNhaP2qirlv7j08xUHTKSBD87g9YLHEqE5 Oct 11 08:05:54 np0005481012 certmonger[38891]: qfm3dhc+Yaf//9qIf4XzjAIO+t80WYeGWIVNkrlp5c47MsxvtVK4Jq9flBBzu77w Oct 11 08:05:54 np0005481012 certmonger[38891]: bChSOJhzXwgat3N+3gPZ6YcOEUqf3aY/hiOOq1eSGHuIPeZISpQWggON1TKjtnrY Oct 11 08:05:54 np0005481012 certmonger[38891]: g/RkzZw58RFYuRYdyrhnzb5MwdO3tYoN+jKuG5Uq1dTVlwcMKYa/cCgptG1EXtAq Oct 11 08:05:54 np0005481012 certmonger[38891]: B31j5PNv1Sg4cHHgpC8t70h5FEAYGrdWNNxWeBT2r9GaHYGRjIWJcLTIp3ePiW/L Oct 11 08:05:54 np0005481012 certmonger[38891]: Md9bI74Nft9AHSGJftZ5s6SOomaR+zZ+b67tM4P8PsPV+dtpI9BLibUG/SCrjdtu Oct 11 08:05:54 np0005481012 certmonger[38891]: OBscfxt3xbAm5Y156nzyBQx2HXekuMPfUYDYwTcbc2UQIo7rHi62gAcjAw1R Oct 11 08:05:54 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:05:54 np0005481012 certmonger[38891]: " Oct 11 08:05:54 np0005481012 certmonger[43646]: 2025-10-11 08:05:54 [43646] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:05:54 np0005481012 certmonger[43646]: MIIFaTCCA9GgAwIBAgIBUzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:54 np0005481012 certmonger[43646]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:54 np0005481012 certmonger[43646]: MDU1NFoXDTI3MTAxMjA4MDU1NFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:54 np0005481012 certmonger[43646]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:54 np0005481012 certmonger[43646]: hvcNAQEBBQADggEPADCCAQoCggEBANyHkCT2Gt6rW/WoQ9jFr6NAavej42jFGp8M Oct 11 08:05:54 np0005481012 certmonger[43646]: dfB2RjXCdaIryk3iRqT2l0pG6xoH9xqiGJ234cbzkW+NK6+3N9YOzechsGS6PR/V Oct 11 08:05:54 np0005481012 certmonger[43646]: RMPEM/0ktBxapK7mYZUDU7OUtaSYKe/bBmv5NxEEaw5h8gCcDQLcjO6r6wxtUdrw Oct 11 08:05:54 np0005481012 certmonger[43646]: Tcvmg1oOi6DjJoO6hEnlge4MOk5VysXihuWxBL1Fm/kFZdq46hjhyqO/a7FkmqQC Oct 11 08:05:54 np0005481012 certmonger[43646]: i+sfqdi0no9y9Q7AqLEoeaRk2YJ094awDFO4wLt7lx9vkFNK3Q/n9IOIq6cEPt/F Oct 11 08:05:54 np0005481012 certmonger[43646]: GTKKREQr21ZX1AHM4IPYvZKOO0c6ToXY4pBhxPzCMLevHUoKmosCAwEAAaOCAfow Oct 11 08:05:54 np0005481012 certmonger[43646]: ggH2MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:54 np0005481012 certmonger[43646]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:54 np0005481012 certmonger[43646]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:54 np0005481012 certmonger[43646]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:54 np0005481012 certmonger[43646]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:54 np0005481012 certmonger[43646]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJAvOvXyTC6bfjC95a/zHGxu Oct 11 08:05:54 np0005481012 certmonger[43646]: WDOcMIHTBgNVHREEgcswgciCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:54 np0005481012 certmonger[43646]: dGVzdKBJBgorBgEEAYI3FAIDoDsMOW92bl9jb250cm9sbGVyL25wMDAwNTQ4MTAx Oct 11 08:05:54 np0005481012 certmonger[43646]: Mi5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBYBgYrBgEFAgKgTjBMoAob Oct 11 08:05:54 np0005481012 certmonger[43646]: CE9PTy5URVNUoT4wPKADAgEBoTUwMxsOb3ZuX2NvbnRyb2xsZXIbIW5wMDAwNTQ4 Oct 11 08:05:54 np0005481012 certmonger[43646]: MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAhztK Oct 11 08:05:54 np0005481012 certmonger[43646]: Ac6/1nMoYGN2Os35U2N9Vy0MmL2Y34IIFXUNR7AIgnPPras8f2c13Z8Q1VdRtXJ5 Oct 11 08:05:54 np0005481012 certmonger[43646]: re8QoFM5x3lU4+uPT/FRygU5rosG5FoNhaP2qirlv7j08xUHTKSBD87g9YLHEqE5 Oct 11 08:05:54 np0005481012 certmonger[43646]: qfm3dhc+Yaf//9qIf4XzjAIO+t80WYeGWIVNkrlp5c47MsxvtVK4Jq9flBBzu77w Oct 11 08:05:54 np0005481012 certmonger[43646]: bChSOJhzXwgat3N+3gPZ6YcOEUqf3aY/hiOOq1eSGHuIPeZISpQWggON1TKjtnrY Oct 11 08:05:54 np0005481012 certmonger[43646]: g/RkzZw58RFYuRYdyrhnzb5MwdO3tYoN+jKuG5Uq1dTVlwcMKYa/cCgptG1EXtAq Oct 11 08:05:54 np0005481012 certmonger[43646]: B31j5PNv1Sg4cHHgpC8t70h5FEAYGrdWNNxWeBT2r9GaHYGRjIWJcLTIp3ePiW/L Oct 11 08:05:54 np0005481012 certmonger[43646]: Md9bI74Nft9AHSGJftZ5s6SOomaR+zZ+b67tM4P8PsPV+dtpI9BLibUG/SCrjdtu Oct 11 08:05:54 np0005481012 certmonger[43646]: OBscfxt3xbAm5Y156nzyBQx2HXekuMPfUYDYwTcbc2UQIo7rHi62gAcjAw1R Oct 11 08:05:54 np0005481012 certmonger[43646]: -----END CERTIFICATE----- Oct 11 08:05:54 np0005481012 certmonger[43646]: ". Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Certificate submission still ongoing. Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Certificate submission postprocessing complete. Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Child status = 0. Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Child output: Oct 11 08:05:54 np0005481012 certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:05:54 np0005481012 certmonger[38891]: " Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:05:54 np0005481012 certmonger[38891]: MIIFaTCCA9GgAwIBAgIBUzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:54 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:54 np0005481012 certmonger[38891]: MDU1NFoXDTI3MTAxMjA4MDU1NFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:54 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:54 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBANyHkCT2Gt6rW/WoQ9jFr6NAavej42jFGp8M Oct 11 08:05:54 np0005481012 certmonger[38891]: dfB2RjXCdaIryk3iRqT2l0pG6xoH9xqiGJ234cbzkW+NK6+3N9YOzechsGS6PR/V Oct 11 08:05:54 np0005481012 certmonger[38891]: RMPEM/0ktBxapK7mYZUDU7OUtaSYKe/bBmv5NxEEaw5h8gCcDQLcjO6r6wxtUdrw Oct 11 08:05:54 np0005481012 certmonger[38891]: Tcvmg1oOi6DjJoO6hEnlge4MOk5VysXihuWxBL1Fm/kFZdq46hjhyqO/a7FkmqQC Oct 11 08:05:54 np0005481012 certmonger[38891]: i+sfqdi0no9y9Q7AqLEoeaRk2YJ094awDFO4wLt7lx9vkFNK3Q/n9IOIq6cEPt/F Oct 11 08:05:54 np0005481012 certmonger[38891]: GTKKREQr21ZX1AHM4IPYvZKOO0c6ToXY4pBhxPzCMLevHUoKmosCAwEAAaOCAfow Oct 11 08:05:54 np0005481012 certmonger[38891]: ggH2MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:54 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:54 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:54 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:54 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:54 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJAvOvXyTC6bfjC95a/zHGxu Oct 11 08:05:54 np0005481012 certmonger[38891]: WDOcMIHTBgNVHREEgcswgciCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:54 np0005481012 certmonger[38891]: dGVzdKBJBgorBgEEAYI3FAIDoDsMOW92bl9jb250cm9sbGVyL25wMDAwNTQ4MTAx Oct 11 08:05:54 np0005481012 certmonger[38891]: Mi5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBYBgYrBgEFAgKgTjBMoAob Oct 11 08:05:54 np0005481012 certmonger[38891]: CE9PTy5URVNUoT4wPKADAgEBoTUwMxsOb3ZuX2NvbnRyb2xsZXIbIW5wMDAwNTQ4 Oct 11 08:05:54 np0005481012 certmonger[38891]: MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAhztK Oct 11 08:05:54 np0005481012 certmonger[38891]: Ac6/1nMoYGN2Os35U2N9Vy0MmL2Y34IIFXUNR7AIgnPPras8f2c13Z8Q1VdRtXJ5 Oct 11 08:05:54 np0005481012 certmonger[38891]: re8QoFM5x3lU4+uPT/FRygU5rosG5FoNhaP2qirlv7j08xUHTKSBD87g9YLHEqE5 Oct 11 08:05:54 np0005481012 certmonger[38891]: qfm3dhc+Yaf//9qIf4XzjAIO+t80WYeGWIVNkrlp5c47MsxvtVK4Jq9flBBzu77w Oct 11 08:05:54 np0005481012 certmonger[38891]: bChSOJhzXwgat3N+3gPZ6YcOEUqf3aY/hiOOq1eSGHuIPeZISpQWggON1TKjtnrY Oct 11 08:05:54 np0005481012 certmonger[38891]: g/RkzZw58RFYuRYdyrhnzb5MwdO3tYoN+jKuG5Uq1dTVlwcMKYa/cCgptG1EXtAq Oct 11 08:05:54 np0005481012 certmonger[38891]: B31j5PNv1Sg4cHHgpC8t70h5FEAYGrdWNNxWeBT2r9GaHYGRjIWJcLTIp3ePiW/L Oct 11 08:05:54 np0005481012 certmonger[38891]: Md9bI74Nft9AHSGJftZ5s6SOomaR+zZ+b67tM4P8PsPV+dtpI9BLibUG/SCrjdtu Oct 11 08:05:54 np0005481012 certmonger[38891]: OBscfxt3xbAm5Y156nzyBQx2HXekuMPfUYDYwTcbc2UQIo7rHi62gAcjAw1R Oct 11 08:05:54 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:05:54 np0005481012 certmonger[38891]: ". Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] No hooks set for pre-save command. Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] No hooks set for post-save command. Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:54 np0005481012 certmonger[43650]: Certificate in file "/etc/pki/tls/certs/ovn_controller.crt" issued by CA and saved. Oct 11 08:05:54 np0005481012 certmonger[38891]: 2025-10-11 08:05:54 [38891] Wrote to /var/lib/certmonger/requests/20251011080553 Oct 11 08:05:55 np0005481012 python3[43666]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:05:56 np0005481012 python3[43686]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:05:59 np0005481012 python3[43703]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:06:02 np0005481012 python3[43720]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:06:02 np0005481012 python3[43736]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:06:03 np0005481012 python3[43752]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:06:04 np0005481012 python3[43770]: ansible-certificate_request Invoked with name=rabbitmq dns=['np0005481012.internalapi.ooo.test'] principal=['rabbitmq/np0005481012.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'rabbitmq(-bundle-.*-[0-9]+)?')#012service_crt="/etc/pki/tls/certs/rabbitmq.crt"#012service_key="/etc/pki/tls/private/rabbitmq.key"#012if echo "$container_name" | grep -q "^rabbitmq-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_crt" "$service_key" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the cert at the mount-point#012 podman cp $service_crt "$container_name:/var/lib/kolla/config_files/src-tls/$service_crt"#012 # Refresh the key at the mount-point#012 podman cp $service_key "$container_name:/var/lib/kolla/config_files/src-tls/$service_key"#012 # Copy the new cert from the mount-point to the real path#012 podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012 # Copy the new key from the mount-point to the real path#012 podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012fi#012# Set appropriate permissions#012podman exec -u root "$container_name" chown rabbitmq:rabbitmq "$service_crt"#012podman exec -u root "$container_name" chown rabbitmq:rabbitmq "$service_key"#012# Trigger a pem cache clear in RabbitMQ to read the new certificates#012podman exec "$container_name" rabbitmqctl eval "ssl:clear_pem_cache()."#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:06:04 np0005481012 certmonger[38891]: 2025-10-11 08:06:04 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:04 np0005481012 certmonger[38891]: 2025-10-11 08:06:04 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:04 np0005481012 certmonger[38891]: 2025-10-11 08:06:04 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:04 np0005481012 certmonger[38891]: 2025-10-11 08:06:04 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:04 np0005481012 certmonger[38891]: 2025-10-11 08:06:04 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:04 np0005481012 certmonger[38891]: 2025-10-11 08:06:04 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:04 np0005481012 certmonger[38891]: 2025-10-11 08:06:04 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:04 np0005481012 certmonger[38891]: 2025-10-11 08:06:04 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:04 np0005481012 certmonger[38891]: 2025-10-11 08:06:04 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:04 np0005481012 certmonger[38891]: 2025-10-11 08:06:04 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:04 np0005481012 certmonger[38891]: 2025-10-11 08:06:04 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:04 np0005481012 certmonger[38891]: 2025-10-11 08:06:04 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:04 np0005481012 certmonger[38891]: 2025-10-11 08:06:04 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:04 np0005481012 certmonger[38891]: 2025-10-11 08:06:04 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:04 np0005481012 certmonger[38891]: 2025-10-11 08:06:04 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:04 np0005481012 certmonger[38891]: 2025-10-11 08:06:04 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:04 np0005481012 certmonger[38891]: 2025-10-11 08:06:04 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:04 np0005481012 certmonger[43780]: 2025-10-11 08:06:04 [43780] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481012.internalapi.ooo.test" for child. Oct 11 08:06:04 np0005481012 certmonger[43780]: 2025-10-11 08:06:04 [43780] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481012.internalapi.ooo.test Oct 11 08:06:04 np0005481012 certmonger[43780]: " for child. Oct 11 08:06:04 np0005481012 certmonger[43780]: 2025-10-11 08:06:04 [43780] Setting "CERTMONGER_REQ_PRINCIPAL" to "rabbitmq/np0005481012.internalapi.ooo.test@OOO.TEST Oct 11 08:06:04 np0005481012 certmonger[43780]: " for child. Oct 11 08:06:04 np0005481012 certmonger[43780]: 2025-10-11 08:06:04 [43780] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:06:04 np0005481012 certmonger[43780]: 2025-10-11 08:06:04 [43780] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:06:04 np0005481012 certmonger[43780]: MIID2jCCAsICAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDEyLmludGVybmFsYXBp Oct 11 08:06:04 np0005481012 certmonger[43780]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvLRDHWBJ Oct 11 08:06:04 np0005481012 certmonger[43780]: kA6OzX/pz6D/HByu+ay9s0q+199gq6u/zByI6hZRGetA3a88K+LiVtxImzzRad8S Oct 11 08:06:04 np0005481012 certmonger[43780]: iFx6/x5XGieLcJvFW3l9pe4O/9SBd0RYa7QBzSJrBph2dzFi6RLVVjUQJUqjPHgc Oct 11 08:06:04 np0005481012 certmonger[43780]: ISjAYwjYRNw0dM/TdgUx0mdFX3PLK16nZmBwdSelmry8tNB10ZIKLpGeuBe7AuNc Oct 11 08:06:04 np0005481012 certmonger[43780]: HulUnQzYSiafj0rmf54X1lQWB8pCyqXaFo1Ri5lGIbSnLC187SREof53C0v+CZD9 Oct 11 08:06:04 np0005481012 certmonger[43780]: JrBmhqGULQPCYVOEjtkinGK0ly7geVWh3YhgLEza7jdTTE7Uk6OijhGumlXmeZsT Oct 11 08:06:04 np0005481012 certmonger[43780]: 4mycCDwR2MFCTQIDAQABoIIBZzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:06:04 np0005481012 certmonger[43780]: ADEAMQAwADgAMAA2ADAANDCCATYGCSqGSIb3DQEJDjGCAScwggEjMAsGA1UdDwQE Oct 11 08:06:04 np0005481012 certmonger[43780]: AwIFoDCBxwYDVR0RBIG/MIG8giFucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29v Oct 11 08:06:04 np0005481012 certmonger[43780]: LnRlc3SgQwYKKwYBBAGCNxQCA6A1DDNyYWJiaXRtcS9ucDAwMDU0ODEwMTIuaW50 Oct 11 08:06:04 np0005481012 certmonger[43780]: ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUgYGKwYBBQICoEgwRqAKGwhPT08u Oct 11 08:06:04 np0005481012 certmonger[43780]: VEVTVKE4MDagAwIBAaEvMC0bCHJhYmJpdG1xGyFucDAwMDU0ODEwMTIuaW50ZXJu Oct 11 08:06:04 np0005481012 certmonger[43780]: YWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwG Oct 11 08:06:04 np0005481012 certmonger[43780]: A1UdEwEB/wQCMAAwHQYDVR0OBBYEFA2ef2SzSBstO8t/jzHP0L3ZgBsUMA0GCSqG Oct 11 08:06:04 np0005481012 certmonger[43780]: SIb3DQEBCwUAA4IBAQA6WML0JH0IxnrYkAKSVkGsgbO9dwWOz3YEwR3xZvWOMDIi Oct 11 08:06:04 np0005481012 certmonger[43780]: ZAQDRNrLXnhFCNApiiOaaJ9rhFgttu33ctGu1XpI2wVuP71hLefYtqmfUQd64M/j Oct 11 08:06:04 np0005481012 certmonger[43780]: 8nE1w6sg2H9CyEFSVtR6SOb5gbyY8fE0hO/VN/oDYDDO1vdf2y78Df5s5wJ5xzx8 Oct 11 08:06:04 np0005481012 certmonger[43780]: zfj2rJ6C8drMfkZinoMQxumoDaY4VLZsrB8SDooT6Jnw5B3I9tn7ei+GjNdOPRcf Oct 11 08:06:04 np0005481012 certmonger[43780]: jQ0mtJGw1HtIbo62nzNvYwe9oPSTKpGugaceH5BPJnoT6b0ON44YP4SoWMXwueca Oct 11 08:06:04 np0005481012 certmonger[43780]: aqp077wRHLvJFXL9Eg36CuTvdxt4nFHIVzHnAZly Oct 11 08:06:04 np0005481012 certmonger[43780]: -----END CERTIFICATE REQUEST----- Oct 11 08:06:04 np0005481012 certmonger[43780]: " for child. Oct 11 08:06:04 np0005481012 certmonger[43780]: 2025-10-11 08:06:04 [43780] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8tEMdYEmQDo7Nf+nPoP8cHK75rL2zSr7X32Crq7/MHIjqFlEZ60Ddrzwr4uJW3EibPNFp3xKIXHr/HlcaJ4twm8VbeX2l7g7/1IF3RFhrtAHNImsGmHZ3MWLpEtVWNRAlSqM8eBwhKMBjCNhE3DR0z9N2BTHSZ0Vfc8srXqdmYHB1J6WavLy00HXRkgoukZ64F7sC41we6VSdDNhKJp+PSuZ/nhfWVBYHykLKpdoWjVGLmUYhtKcsLXztJESh/ncLS/4JkP0msGaGoZQtA8JhU4SO2SKcYrSXLuB5VaHdiGAsTNruN1NMTtSTo6KOEa6aVeZ5mxPibJwIPBHYwUJNAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAX/ltHzSLL2g/45nPQJqTw678Kuc1jRa1WNyW+MMk7aWzaVRD9koFPV709GW8zLFreGXNLfhsKfp0MTacwi/W0GMyuF4clktjIO9iLsA9cK9PyHkxAqUXCkXGbO3JIEFhqRJnAnVw6iWtZmQfsBXK7jtt7GrPUGU/SZMBCN1sXvydD2MFKR13x3xxnCd2Pezx2/FjSUwqFdjIBNqHDrWdC4uLN13nOdFL4LAQVXu51wuQ93iKanoH8FxKj1uzB1L2yh5AMjV1jVdsgLnfXneD2ckWBKMeBqonWl5X/up3Q09zr9dTjNhdFVEqIhLugPnlms41Q4UXUtL2dh89wCAzLA==" for child. Oct 11 08:06:04 np0005481012 certmonger[43780]: 2025-10-11 08:06:04 [43780] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvLRDHWBJkA6OzX/pz6D/HByu+ay9s0q+199gq6u/zByI6hZRGetA3a88K+LiVtxImzzRad8SiFx6/x5XGieLcJvFW3l9pe4O/9SBd0RYa7QBzSJrBph2dzFi6RLVVjUQJUqjPHgcISjAYwjYRNw0dM/TdgUx0mdFX3PLK16nZmBwdSelmry8tNB10ZIKLpGeuBe7AuNcHulUnQzYSiafj0rmf54X1lQWB8pCyqXaFo1Ri5lGIbSnLC187SREof53C0v+CZD9JrBmhqGULQPCYVOEjtkinGK0ly7geVWh3YhgLEza7jdTTE7Uk6OijhGumlXmeZsT4mycCDwR2MFCTQIDAQAB" for child. Oct 11 08:06:04 np0005481012 certmonger[43780]: 2025-10-11 08:06:04 [43780] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:06:04 np0005481012 certmonger[43780]: 2025-10-11 08:06:04 [43780] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:06:04 np0005481012 certmonger[43780]: 2025-10-11 08:06:04 [43780] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:06:04 np0005481012 certmonger[43780]: 2025-10-11 08:06:04 [43780] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:06:04 np0005481012 certmonger[43780]: 2025-10-11 08:06:04 [43780] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:06:04 np0005481012 certmonger[38891]: 2025-10-11 08:06:04 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:04 np0005481012 certmonger[43780]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:06:05 np0005481012 certmonger[43780]: Certificate: "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" Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Certificate submission still ongoing. Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Certificate submission attempt complete. Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Child status = 0. Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Child output: Oct 11 08:06:05 np0005481012 certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 08:06:05 np0005481012 certmonger[38891]: MIIFXTCCA8WgAwIBAgIBVTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:06:05 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:06:05 np0005481012 certmonger[38891]: MDYwNVoXDTI3MTAxMjA4MDYwNVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:06:05 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:06:05 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBALy0Qx1gSZAOjs1/6c+g/xwcrvmsvbNKvtff Oct 11 08:06:05 np0005481012 certmonger[38891]: YKurv8wciOoWURnrQN2vPCvi4lbcSJs80WnfEohcev8eVxoni3CbxVt5faXuDv/U Oct 11 08:06:05 np0005481012 certmonger[38891]: gXdEWGu0Ac0iawaYdncxYukS1VY1ECVKozx4HCEowGMI2ETcNHTP03YFMdJnRV9z Oct 11 08:06:05 np0005481012 certmonger[38891]: yytep2ZgcHUnpZq8vLTQddGSCi6RnrgXuwLjXB7pVJ0M2Eomn49K5n+eF9ZUFgfK Oct 11 08:06:05 np0005481012 certmonger[38891]: Qsql2haNUYuZRiG0pywtfO0kRKH+dwtL/gmQ/SawZoahlC0DwmFThI7ZIpxitJcu Oct 11 08:06:05 np0005481012 certmonger[38891]: 4HlVod2IYCxM2u43U0xO1JOjoo4RrppV5nmbE+JsnAg8EdjBQk0CAwEAAaOCAe4w Oct 11 08:06:05 np0005481012 certmonger[38891]: ggHqMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:06:05 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:06:05 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:06:05 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:06:05 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:06:05 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFhTub0nNm3HJPQbs1/v6Q5J Oct 11 08:06:05 np0005481012 certmonger[38891]: 8KOuMIHHBgNVHREEgb8wgbyCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:06:05 np0005481012 certmonger[38891]: dGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25wMDAwNTQ4MTAxMi5pbnRl Oct 11 08:06:05 np0005481012 certmonger[38891]: cm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEFAgKgSDBGoAobCE9PTy5U Oct 11 08:06:05 np0005481012 certmonger[38891]: RVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAwNTQ4MTAxMi5pbnRlcm5h Oct 11 08:06:05 np0005481012 certmonger[38891]: bGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAi8qjRs+geYoxBCLA6HWS Oct 11 08:06:05 np0005481012 certmonger[38891]: xAIodVtbjBpeBPr31uIOQXnnz2rtGzwNuWx16k83qrMHnL1Rx88EmyWFJMhoFZ9+ Oct 11 08:06:05 np0005481012 certmonger[38891]: hHWajWWE0MM8v/r/RnaTr6n9uLwtkxLqdPw4E+0QTjxiOG7BPO6G+a0Knz9sCVQb Oct 11 08:06:05 np0005481012 certmonger[38891]: y2MuRKaFUvGKZxQ+h2p7ZzvH9W+x/WJRr9lUe7uQzqP0toMptq7n/FKfHh9d1Hbf Oct 11 08:06:05 np0005481012 certmonger[38891]: sU2WkvY2vUHlQf8QFm9ahcIk2/SzSVecsf99LVfZ8tQftFQE6UJ9anf3neBwGKXv Oct 11 08:06:05 np0005481012 certmonger[38891]: ZBxm+EB/0/QlCAvG31M11z+1Kf4ZLZ5R4Wg/oqRx3JunmmOaousXYZ8CjcuvAj+t Oct 11 08:06:05 np0005481012 certmonger[38891]: 1gULvbSRi8q2aOXNmS5SJvUlGaPRbuOSyuFFMP4CrJ4L1he0+rVwZOLtEuYev5IA Oct 11 08:06:05 np0005481012 certmonger[38891]: YdkX151vpl6z7jSe6hjH3CQhqfhJJTEEQzVgEkdKmF/5TS02QZnuu/YurHxlM0K+ Oct 11 08:06:05 np0005481012 certmonger[38891]: jYTse4kx/Y2rCOYqHuiWREQnh7BkyAPC96qmjuyGflsd Oct 11 08:06:05 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:06:05 np0005481012 certmonger[38891]: " Oct 11 08:06:05 np0005481012 certmonger[43782]: 2025-10-11 08:06:05 [43782] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:06:05 np0005481012 certmonger[43782]: MIIFXTCCA8WgAwIBAgIBVTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:06:05 np0005481012 certmonger[43782]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:06:05 np0005481012 certmonger[43782]: MDYwNVoXDTI3MTAxMjA4MDYwNVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:06:05 np0005481012 certmonger[43782]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:06:05 np0005481012 certmonger[43782]: hvcNAQEBBQADggEPADCCAQoCggEBALy0Qx1gSZAOjs1/6c+g/xwcrvmsvbNKvtff Oct 11 08:06:05 np0005481012 certmonger[43782]: YKurv8wciOoWURnrQN2vPCvi4lbcSJs80WnfEohcev8eVxoni3CbxVt5faXuDv/U Oct 11 08:06:05 np0005481012 certmonger[43782]: gXdEWGu0Ac0iawaYdncxYukS1VY1ECVKozx4HCEowGMI2ETcNHTP03YFMdJnRV9z Oct 11 08:06:05 np0005481012 certmonger[43782]: yytep2ZgcHUnpZq8vLTQddGSCi6RnrgXuwLjXB7pVJ0M2Eomn49K5n+eF9ZUFgfK Oct 11 08:06:05 np0005481012 certmonger[43782]: Qsql2haNUYuZRiG0pywtfO0kRKH+dwtL/gmQ/SawZoahlC0DwmFThI7ZIpxitJcu Oct 11 08:06:05 np0005481012 certmonger[43782]: 4HlVod2IYCxM2u43U0xO1JOjoo4RrppV5nmbE+JsnAg8EdjBQk0CAwEAAaOCAe4w Oct 11 08:06:05 np0005481012 certmonger[43782]: ggHqMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:06:05 np0005481012 certmonger[43782]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:06:05 np0005481012 certmonger[43782]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:06:05 np0005481012 certmonger[43782]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:06:05 np0005481012 certmonger[43782]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:06:05 np0005481012 certmonger[43782]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFhTub0nNm3HJPQbs1/v6Q5J Oct 11 08:06:05 np0005481012 certmonger[43782]: 8KOuMIHHBgNVHREEgb8wgbyCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:06:05 np0005481012 certmonger[43782]: dGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25wMDAwNTQ4MTAxMi5pbnRl Oct 11 08:06:05 np0005481012 certmonger[43782]: cm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEFAgKgSDBGoAobCE9PTy5U Oct 11 08:06:05 np0005481012 certmonger[43782]: RVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAwNTQ4MTAxMi5pbnRlcm5h Oct 11 08:06:05 np0005481012 certmonger[43782]: bGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAi8qjRs+geYoxBCLA6HWS Oct 11 08:06:05 np0005481012 certmonger[43782]: xAIodVtbjBpeBPr31uIOQXnnz2rtGzwNuWx16k83qrMHnL1Rx88EmyWFJMhoFZ9+ Oct 11 08:06:05 np0005481012 certmonger[43782]: hHWajWWE0MM8v/r/RnaTr6n9uLwtkxLqdPw4E+0QTjxiOG7BPO6G+a0Knz9sCVQb Oct 11 08:06:05 np0005481012 certmonger[43782]: y2MuRKaFUvGKZxQ+h2p7ZzvH9W+x/WJRr9lUe7uQzqP0toMptq7n/FKfHh9d1Hbf Oct 11 08:06:05 np0005481012 certmonger[43782]: sU2WkvY2vUHlQf8QFm9ahcIk2/SzSVecsf99LVfZ8tQftFQE6UJ9anf3neBwGKXv Oct 11 08:06:05 np0005481012 certmonger[43782]: ZBxm+EB/0/QlCAvG31M11z+1Kf4ZLZ5R4Wg/oqRx3JunmmOaousXYZ8CjcuvAj+t Oct 11 08:06:05 np0005481012 certmonger[43782]: 1gULvbSRi8q2aOXNmS5SJvUlGaPRbuOSyuFFMP4CrJ4L1he0+rVwZOLtEuYev5IA Oct 11 08:06:05 np0005481012 certmonger[43782]: YdkX151vpl6z7jSe6hjH3CQhqfhJJTEEQzVgEkdKmF/5TS02QZnuu/YurHxlM0K+ Oct 11 08:06:05 np0005481012 certmonger[43782]: jYTse4kx/Y2rCOYqHuiWREQnh7BkyAPC96qmjuyGflsd Oct 11 08:06:05 np0005481012 certmonger[43782]: -----END CERTIFICATE----- Oct 11 08:06:05 np0005481012 certmonger[43782]: ". Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Certificate submission still ongoing. Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Certificate submission postprocessing complete. Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Child status = 0. Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Child output: Oct 11 08:06:05 np0005481012 certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----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\njYTse4kx/Y2rCOYqHuiWREQnh7BkyAPC96qmjuyGflsd\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:06:05 np0005481012 certmonger[38891]: " Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:06:05 np0005481012 certmonger[38891]: MIIFXTCCA8WgAwIBAgIBVTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:06:05 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:06:05 np0005481012 certmonger[38891]: MDYwNVoXDTI3MTAxMjA4MDYwNVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:06:05 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:06:05 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBALy0Qx1gSZAOjs1/6c+g/xwcrvmsvbNKvtff Oct 11 08:06:05 np0005481012 certmonger[38891]: YKurv8wciOoWURnrQN2vPCvi4lbcSJs80WnfEohcev8eVxoni3CbxVt5faXuDv/U Oct 11 08:06:05 np0005481012 certmonger[38891]: gXdEWGu0Ac0iawaYdncxYukS1VY1ECVKozx4HCEowGMI2ETcNHTP03YFMdJnRV9z Oct 11 08:06:05 np0005481012 certmonger[38891]: yytep2ZgcHUnpZq8vLTQddGSCi6RnrgXuwLjXB7pVJ0M2Eomn49K5n+eF9ZUFgfK Oct 11 08:06:05 np0005481012 certmonger[38891]: Qsql2haNUYuZRiG0pywtfO0kRKH+dwtL/gmQ/SawZoahlC0DwmFThI7ZIpxitJcu Oct 11 08:06:05 np0005481012 certmonger[38891]: 4HlVod2IYCxM2u43U0xO1JOjoo4RrppV5nmbE+JsnAg8EdjBQk0CAwEAAaOCAe4w Oct 11 08:06:05 np0005481012 certmonger[38891]: ggHqMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:06:05 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:06:05 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:06:05 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:06:05 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:06:05 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFhTub0nNm3HJPQbs1/v6Q5J Oct 11 08:06:05 np0005481012 certmonger[38891]: 8KOuMIHHBgNVHREEgb8wgbyCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:06:05 np0005481012 certmonger[38891]: dGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25wMDAwNTQ4MTAxMi5pbnRl Oct 11 08:06:05 np0005481012 certmonger[38891]: cm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEFAgKgSDBGoAobCE9PTy5U Oct 11 08:06:05 np0005481012 certmonger[38891]: RVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAwNTQ4MTAxMi5pbnRlcm5h Oct 11 08:06:05 np0005481012 certmonger[38891]: bGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAi8qjRs+geYoxBCLA6HWS Oct 11 08:06:05 np0005481012 certmonger[38891]: xAIodVtbjBpeBPr31uIOQXnnz2rtGzwNuWx16k83qrMHnL1Rx88EmyWFJMhoFZ9+ Oct 11 08:06:05 np0005481012 certmonger[38891]: hHWajWWE0MM8v/r/RnaTr6n9uLwtkxLqdPw4E+0QTjxiOG7BPO6G+a0Knz9sCVQb Oct 11 08:06:05 np0005481012 certmonger[38891]: y2MuRKaFUvGKZxQ+h2p7ZzvH9W+x/WJRr9lUe7uQzqP0toMptq7n/FKfHh9d1Hbf Oct 11 08:06:05 np0005481012 certmonger[38891]: sU2WkvY2vUHlQf8QFm9ahcIk2/SzSVecsf99LVfZ8tQftFQE6UJ9anf3neBwGKXv Oct 11 08:06:05 np0005481012 certmonger[38891]: ZBxm+EB/0/QlCAvG31M11z+1Kf4ZLZ5R4Wg/oqRx3JunmmOaousXYZ8CjcuvAj+t Oct 11 08:06:05 np0005481012 certmonger[38891]: 1gULvbSRi8q2aOXNmS5SJvUlGaPRbuOSyuFFMP4CrJ4L1he0+rVwZOLtEuYev5IA Oct 11 08:06:05 np0005481012 certmonger[38891]: YdkX151vpl6z7jSe6hjH3CQhqfhJJTEEQzVgEkdKmF/5TS02QZnuu/YurHxlM0K+ Oct 11 08:06:05 np0005481012 certmonger[38891]: jYTse4kx/Y2rCOYqHuiWREQnh7BkyAPC96qmjuyGflsd Oct 11 08:06:05 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:06:05 np0005481012 certmonger[38891]: ". Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] No hooks set for pre-save command. Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:05 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:05 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:05 np0005481012 certmonger[43886]: Certificate in file "/etc/pki/tls/certs/rabbitmq.crt" issued by CA and saved. Oct 11 08:06:05 np0005481012 certmonger[38891]: 2025-10-11 08:06:05 [38891] Wrote to /var/lib/certmonger/requests/20251011080604 Oct 11 08:06:06 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:06 np0005481012 python3[43902]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:06:13 np0005481012 podman[43903]: 2025-10-11 08:06:06.544873297 +0000 UTC m=+0.048845283 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Oct 11 08:06:13 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:14 np0005481012 python3[44014]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 cluster.common.tag/rabbitmq:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:06:14 np0005481012 podman[44015]: 2025-10-11 08:06:14.178765586 +0000 UTC m=+0.030710365 image tag 0fe17636bae901521de90b30f1dee371909a7d6e5bc2e1f72392fb6f24c02e4d cluster.common.tag/rabbitmq:pcmklatest Oct 11 08:06:14 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:14 np0005481012 python3[44043]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:06:14 np0005481012 python3[44043]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 --format json Oct 11 08:06:14 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:14 np0005481012 python3[44043]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 -q --tls-verify=false Oct 11 08:06:19 np0005481012 podman[44055]: 2025-10-11 08:06:14.794328498 +0000 UTC m=+0.044694933 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 Oct 11 08:06:19 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:19 np0005481012 python3[44043]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect fb8a6693beee68287a0f02201de79217e47346216a623f9fa87d3a80e8a156d0 --format json Oct 11 08:06:19 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:19 np0005481012 python3[44191]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:06:19 np0005481012 python3[44191]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 --format json Oct 11 08:06:19 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:19 np0005481012 python3[44191]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 -q --tls-verify=false Oct 11 08:06:24 np0005481012 podman[44204]: 2025-10-11 08:06:19.751492613 +0000 UTC m=+0.028482996 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 Oct 11 08:06:24 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:24 np0005481012 python3[44191]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 9f1d58481b92b0ac72a6e8cc6e9beeecd3d8f2fa81e58d20b5d3093170a87b09 --format json Oct 11 08:06:24 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:24 np0005481012 python3[44326]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:06:24 np0005481012 python3[44326]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 --format json Oct 11 08:06:24 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:24 np0005481012 python3[44326]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 -q --tls-verify=false Oct 11 08:06:27 np0005481012 podman[44338]: 2025-10-11 08:06:24.875043167 +0000 UTC m=+0.037347178 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 Oct 11 08:06:27 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:27 np0005481012 python3[44326]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 9f44ac27c6ae5ee5c1f78a00a0d801e404d75691dd3bd9c73675c21893b32179 --format json Oct 11 08:06:27 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:28 np0005481012 python3[44460]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:06:28 np0005481012 python3[44460]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 --format json Oct 11 08:06:28 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:28 np0005481012 python3[44460]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 -q --tls-verify=false Oct 11 08:06:31 np0005481012 podman[44473]: 2025-10-11 08:06:28.358558145 +0000 UTC m=+0.040852215 image pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Oct 11 08:06:31 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:31 np0005481012 python3[44460]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect e73a71f3bab32912341886b13c2f3c5c0880a42512494d8bfe2884e7d7d6824c --format json Oct 11 08:06:31 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:32 np0005481012 python3[44596]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:06:32 np0005481012 python3[44596]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 --format json Oct 11 08:06:32 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:32 np0005481012 python3[44596]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 -q --tls-verify=false Oct 11 08:06:35 np0005481012 podman[44608]: 2025-10-11 08:06:32.227296282 +0000 UTC m=+0.050684337 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Oct 11 08:06:35 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:35 np0005481012 python3[44596]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 1571c200d626c35388c5864f613dd17fb1618f6192fe622da60a47fa61763c46 --format json Oct 11 08:06:35 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:35 np0005481012 python3[44732]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:06:35 np0005481012 python3[44732]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 --format json Oct 11 08:06:35 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:35 np0005481012 python3[44732]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 -q --tls-verify=false Oct 11 08:06:37 np0005481012 podman[44745]: 2025-10-11 08:06:35.712017528 +0000 UTC m=+0.033964274 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Oct 11 08:06:37 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:37 np0005481012 python3[44732]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect eb2deacebcb0e732dc23a6e49150052f3f1724aa184df8abe621651e45eee06c --format json Oct 11 08:06:37 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:37 np0005481012 python3[44855]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:06:37 np0005481012 python3[44855]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 --format json Oct 11 08:06:38 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:38 np0005481012 python3[44855]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 -q --tls-verify=false Oct 11 08:06:40 np0005481012 podman[44869]: 2025-10-11 08:06:38.069076964 +0000 UTC m=+0.042992522 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Oct 11 08:06:40 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:40 np0005481012 python3[44855]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 0fe17636bae901521de90b30f1dee371909a7d6e5bc2e1f72392fb6f24c02e4d --format json Oct 11 08:06:40 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:40 np0005481012 python3[44978]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:06:40 np0005481012 python3[44978]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 --format json Oct 11 08:06:40 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:40 np0005481012 python3[44978]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 -q --tls-verify=false Oct 11 08:06:45 np0005481012 podman[44990]: 2025-10-11 08:06:40.712816811 +0000 UTC m=+0.031892330 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Oct 11 08:06:45 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:45 np0005481012 python3[44978]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect b966910419609da2f577c540a2e97890b8ed044ade282d8611d845762136555d --format json Oct 11 08:06:46 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:46 np0005481012 python3[45369]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:06:46 np0005481012 python3[45369]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 --format json Oct 11 08:06:46 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:46 np0005481012 python3[45369]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 -q --tls-verify=false Oct 11 08:06:49 np0005481012 podman[45382]: 2025-10-11 08:06:46.500088617 +0000 UTC m=+0.046900882 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Oct 11 08:06:49 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:49 np0005481012 python3[45369]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect e1025d0160926b2478cff0c3ae6dabd48bf901c8d824a98ef2b2e78a3c7fa2eb --format json Oct 11 08:06:49 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:50 np0005481012 python3[45505]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:06:50 np0005481012 python3[45505]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 --format json Oct 11 08:06:50 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:50 np0005481012 python3[45505]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 -q --tls-verify=false Oct 11 08:06:52 np0005481012 podman[45517]: 2025-10-11 08:06:50.48164719 +0000 UTC m=+0.044682143 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 Oct 11 08:06:52 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:52 np0005481012 python3[45505]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 4cfb90098422284da1d8ef01853709c60dec6ef1c9a2dcdf7ca7407d826e5512 --format json Oct 11 08:06:52 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:52 np0005481012 python3[45638]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:06:52 np0005481012 python3[45638]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 --format json Oct 11 08:06:52 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:06:53 np0005481012 python3[45638]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 -q --tls-verify=false Oct 11 08:07:02 np0005481012 podman[45651]: 2025-10-11 08:06:53.051085626 +0000 UTC m=+0.040493575 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Oct 11 08:07:02 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:02 np0005481012 python3[45638]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 447401b86bcb477eb5bae5c77932dcf0cb066b2a802d29cff00771dfb8ca2877 --format json Oct 11 08:07:02 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:03 np0005481012 python3[45897]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:07:03 np0005481012 python3[45897]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 --format json Oct 11 08:07:03 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:03 np0005481012 python3[45897]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 -q --tls-verify=false Oct 11 08:07:10 np0005481012 podman[45909]: 2025-10-11 08:07:03.192816817 +0000 UTC m=+0.045260091 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 Oct 11 08:07:10 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:10 np0005481012 python3[45897]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 15779505045749d0f87c23467f6cb9935f02e499ee1aacdf2d6b1567f859af96 --format json Oct 11 08:07:10 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:10 np0005481012 python3[46044]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:07:10 np0005481012 python3[46044]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 --format json Oct 11 08:07:10 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:10 np0005481012 python3[46044]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 -q --tls-verify=false Oct 11 08:07:18 np0005481012 podman[46056]: 2025-10-11 08:07:10.794103361 +0000 UTC m=+0.042932890 image pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Oct 11 08:07:18 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:18 np0005481012 python3[46044]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 167fda607a6d7dc8af502904a099903e441c7fea928fd5acd5ba236b573ce9af --format json Oct 11 08:07:18 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:19 np0005481012 python3[46185]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:07:19 np0005481012 python3[46185]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 --format json Oct 11 08:07:19 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:19 np0005481012 python3[46185]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 -q --tls-verify=false Oct 11 08:07:24 np0005481012 podman[46198]: 2025-10-11 08:07:19.157908505 +0000 UTC m=+0.032866591 image pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Oct 11 08:07:24 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:24 np0005481012 python3[46185]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect a82affbd47d98c40f4cfe573861dfc3fa58282e5f9cddc7973ab269093c8a1c2 --format json Oct 11 08:07:24 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:24 np0005481012 python3[46322]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:07:24 np0005481012 python3[46322]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 --format json Oct 11 08:07:24 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:24 np0005481012 python3[46322]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 -q --tls-verify=false Oct 11 08:07:28 np0005481012 podman[46335]: 2025-10-11 08:07:24.659603774 +0000 UTC m=+0.043970486 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Oct 11 08:07:28 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:28 np0005481012 python3[46322]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 3b5a08d67a860e3c0a9f57caa528e73254e53d40d0befae3ec354732ae396d0b --format json Oct 11 08:07:28 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:28 np0005481012 python3[46457]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:07:28 np0005481012 python3[46457]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 --format json Oct 11 08:07:28 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:28 np0005481012 python3[46457]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 -q --tls-verify=false Oct 11 08:07:39 np0005481012 podman[46472]: 2025-10-11 08:07:28.637682427 +0000 UTC m=+0.047027195 image pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Oct 11 08:07:39 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:39 np0005481012 python3[46457]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect a803884207d9182b24f7629d8c3a7431e2cd91b63902dc1d773d21683f1360cf --format json Oct 11 08:07:39 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:39 np0005481012 python3[46694]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:07:39 np0005481012 python3[46694]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 --format json Oct 11 08:07:39 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:39 np0005481012 python3[46694]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 -q --tls-verify=false Oct 11 08:07:50 np0005481012 podman[46861]: 2025-10-11 08:07:39.74262744 +0000 UTC m=+0.046003905 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Oct 11 08:07:50 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:50 np0005481012 python3[46694]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 8507cfad8adf60ce0ac55ad72a86aac763a357b88300cebf796de3bc732b7f58 --format json Oct 11 08:07:50 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:51 np0005481012 python3[47068]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:07:51 np0005481012 python3[47068]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 --format json Oct 11 08:07:51 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:51 np0005481012 python3[47068]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 -q --tls-verify=false Oct 11 08:07:54 np0005481012 podman[47082]: 2025-10-11 08:07:51.577718355 +0000 UTC m=+0.051217578 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 Oct 11 08:07:54 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:54 np0005481012 python3[47068]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect f2875b56e5b8bc82f1d30120eea91196f619a58f2bcf511cdc876202254191dc --format json Oct 11 08:07:54 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:54 np0005481012 python3[47205]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:07:54 np0005481012 python3[47205]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 --format json Oct 11 08:07:54 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:54 np0005481012 python3[47205]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 -q --tls-verify=false Oct 11 08:07:58 np0005481012 podman[47217]: 2025-10-11 08:07:54.981659694 +0000 UTC m=+0.033455949 image pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Oct 11 08:07:58 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:58 np0005481012 python3[47205]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 3fb7c9f61f2d12d8d26596a592d8309d080d5f1541f5a96437b72b53fdd69feb --format json Oct 11 08:07:58 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:58 np0005481012 python3[47340]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:07:58 np0005481012 python3[47340]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 --format json Oct 11 08:07:58 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:07:59 np0005481012 python3[47340]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 -q --tls-verify=false Oct 11 08:08:03 np0005481012 podman[47354]: 2025-10-11 08:07:59.036421078 +0000 UTC m=+0.027071391 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 Oct 11 08:08:03 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:03 np0005481012 python3[47340]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 12b983f2bdbde314033d24179bd9961c3d66ef262d1ed3fb7bfaff9562d369ec --format json Oct 11 08:08:03 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:04 np0005481012 python3[47490]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:08:04 np0005481012 python3[47490]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 --format json Oct 11 08:08:04 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:04 np0005481012 python3[47490]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 -q --tls-verify=false Oct 11 08:08:06 np0005481012 podman[47503]: 2025-10-11 08:08:04.198765153 +0000 UTC m=+0.048665873 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 Oct 11 08:08:06 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:06 np0005481012 python3[47490]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect a494a4709399d3b48f7a72d9a7ba248a8aef77a31bc332f2b941ea1a9802eb23 --format json Oct 11 08:08:06 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:07 np0005481012 python3[47613]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:08:07 np0005481012 python3[47613]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 --format json Oct 11 08:08:07 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:07 np0005481012 python3[47613]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 -q --tls-verify=false Oct 11 08:08:09 np0005481012 podman[47625]: 2025-10-11 08:08:07.213519511 +0000 UTC m=+0.047839888 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 Oct 11 08:08:09 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:09 np0005481012 python3[47613]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 6478a0150ae96c1577ab98090485db34bd923bea7fbd99b449759855054ad48a --format json Oct 11 08:08:09 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:09 np0005481012 python3[47735]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:08:09 np0005481012 python3[47735]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 --format json Oct 11 08:08:09 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:09 np0005481012 python3[47735]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 -q --tls-verify=false Oct 11 08:08:15 np0005481012 podman[47748]: 2025-10-11 08:08:09.897576959 +0000 UTC m=+0.045222842 image pull registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Oct 11 08:08:15 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:15 np0005481012 python3[47735]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ef4308e71ba3950618e5de99f6c775558514a06fb9f6d93ca5c54d685a1349a6 --format json Oct 11 08:08:15 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:15 np0005481012 python3[47870]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:08:15 np0005481012 python3[47870]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 --format json Oct 11 08:08:15 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:15 np0005481012 python3[47870]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 -q --tls-verify=false Oct 11 08:08:19 np0005481012 podman[47883]: 2025-10-11 08:08:15.530312686 +0000 UTC m=+0.035260052 image pull registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Oct 11 08:08:19 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:19 np0005481012 python3[47870]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 5b5e3dbf480a168d795a47e53d0695cd833f381ef10119a3de87e5946f6b53e5 --format json Oct 11 08:08:19 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:19 np0005481012 python3[48016]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:08:19 np0005481012 python3[48016]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 --format json Oct 11 08:08:19 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:19 np0005481012 python3[48016]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 -q --tls-verify=false Oct 11 08:08:21 np0005481012 podman[48028]: 2025-10-11 08:08:19.860801795 +0000 UTC m=+0.044575573 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 Oct 11 08:08:21 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:21 np0005481012 python3[48016]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 5b8751731d4e88def30b35fe920ea8b7144eb85593c68b79fefc7a35d737b9c5 --format json Oct 11 08:08:21 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:22 np0005481012 python3[48139]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:08:22 np0005481012 python3[48139]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 --format json Oct 11 08:08:22 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:22 np0005481012 python3[48139]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 -q --tls-verify=false Oct 11 08:08:25 np0005481012 podman[48152]: 2025-10-11 08:08:22.311818542 +0000 UTC m=+0.050404222 image pull registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Oct 11 08:08:25 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:25 np0005481012 python3[48139]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 250768c493b95c1151e047902a648e6659ba35adb4c6e0af85c231937d0cc9b7 --format json Oct 11 08:08:25 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:25 np0005481012 python3[48276]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:08:25 np0005481012 python3[48276]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 --format json Oct 11 08:08:25 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:25 np0005481012 python3[48276]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 -q --tls-verify=false Oct 11 08:08:30 np0005481012 podman[48290]: 2025-10-11 08:08:25.669929744 +0000 UTC m=+0.050163094 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Oct 11 08:08:30 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:30 np0005481012 python3[48276]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 5eb0b610e4075103526444dd3d6b0b4adc5ff85409bd781bbba9af29712a9f3a --format json Oct 11 08:08:30 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:30 np0005481012 python3[48426]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:08:30 np0005481012 python3[48426]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 --format json Oct 11 08:08:30 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:30 np0005481012 python3[48426]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 -q --tls-verify=false Oct 11 08:08:33 np0005481012 podman[48439]: 2025-10-11 08:08:30.772661567 +0000 UTC m=+0.046975728 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 Oct 11 08:08:33 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:33 np0005481012 python3[48426]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 9e24f189b3636f0d661cc8aff88c6ce2baa4d125a24f4bd633cc49c6fd37815d --format json Oct 11 08:08:33 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:33 np0005481012 python3[48562]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:08:33 np0005481012 python3[48562]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 --format json Oct 11 08:08:33 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:33 np0005481012 python3[48562]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 -q --tls-verify=false Oct 11 08:08:37 np0005481012 podman[48575]: 2025-10-11 08:08:33.959515331 +0000 UTC m=+0.033950670 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Oct 11 08:08:37 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:37 np0005481012 python3[48562]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 424d0537eafa9450f2993d93f50372ae4d683ac0a3c77e8597319d0a54a2b18a --format json Oct 11 08:08:37 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:37 np0005481012 python3[48760]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:08:37 np0005481012 python3[48760]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 --format json Oct 11 08:08:37 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:37 np0005481012 python3[48760]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 -q --tls-verify=false Oct 11 08:08:41 np0005481012 podman[48774]: 2025-10-11 08:08:37.902623521 +0000 UTC m=+0.035447295 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Oct 11 08:08:41 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:41 np0005481012 python3[48760]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 01fc8d861e2b923ef0bf1d5c40a269bd976b00e8a31e8c56d63f3504b82b1c76 --format json Oct 11 08:08:41 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:41 np0005481012 python3[48898]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:08:41 np0005481012 python3[48898]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 --format json Oct 11 08:08:41 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:41 np0005481012 python3[48898]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 -q --tls-verify=false Oct 11 08:08:44 np0005481012 podman[48910]: 2025-10-11 08:08:41.582104001 +0000 UTC m=+0.038604722 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Oct 11 08:08:44 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:44 np0005481012 python3[48898]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 60f7c11feb43ac02004f92bead49aafd69ddde0f5e252aa745d4bfbaad3cc7d4 --format json Oct 11 08:08:44 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:44 np0005481012 python3[49035]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:08:44 np0005481012 python3[49035]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 --format json Oct 11 08:08:44 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:44 np0005481012 python3[49035]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 -q --tls-verify=false Oct 11 08:08:48 np0005481012 podman[49049]: 2025-10-11 08:08:44.923022456 +0000 UTC m=+0.034234628 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Oct 11 08:08:48 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:48 np0005481012 python3[49035]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 00462d008b1708fdd147e5a33f4e1be6c29fa6d29fc5e6616de11485b3a7d26f --format json Oct 11 08:08:48 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:48 np0005481012 python3[49171]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:08:48 np0005481012 python3[49171]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 --format json Oct 11 08:08:48 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:48 np0005481012 python3[49171]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 -q --tls-verify=false Oct 11 08:08:51 np0005481012 podman[49183]: 2025-10-11 08:08:48.737886895 +0000 UTC m=+0.046633937 image pull registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Oct 11 08:08:51 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:51 np0005481012 python3[49171]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 7f7fcb1a516a6191c7a8cb132a460e04d50ca4381f114f08dcbfe84340e49ac0 --format json Oct 11 08:08:51 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:51 np0005481012 python3[49305]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:08:51 np0005481012 python3[49305]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 --format json Oct 11 08:08:51 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:51 np0005481012 python3[49305]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 -q --tls-verify=false Oct 11 08:08:54 np0005481012 podman[49319]: 2025-10-11 08:08:51.853774989 +0000 UTC m=+0.039077306 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 Oct 11 08:08:54 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:54 np0005481012 python3[49305]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 903322252b49f98ece47489a0bd245a5c7f7a9e6f465f0df1184168e1b2e45c0 --format json Oct 11 08:08:54 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:54 np0005481012 python3[49443]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:08:54 np0005481012 python3[49443]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 --format json Oct 11 08:08:54 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:54 np0005481012 python3[49443]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 -q --tls-verify=false Oct 11 08:08:58 np0005481012 podman[49455]: 2025-10-11 08:08:55.009980597 +0000 UTC m=+0.034868198 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 Oct 11 08:08:58 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:58 np0005481012 python3[49443]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ebc633f430db717bee8411568d84409b0e467361d8d610d04f36c0f5099c2ac6 --format json Oct 11 08:08:58 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:58 np0005481012 python3[49576]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:08:58 np0005481012 python3[49576]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 --format json Oct 11 08:08:58 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:08:58 np0005481012 python3[49576]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 -q --tls-verify=false Oct 11 08:09:03 np0005481012 podman[49588]: 2025-10-11 08:08:58.943111603 +0000 UTC m=+0.046573196 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 Oct 11 08:09:03 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:09:03 np0005481012 python3[49576]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 6ae7dc8c23d11fdd05dd9c7188ab03eadc1499f98f781f6f2e46e49b4bdcfcd0 --format json Oct 11 08:09:03 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:09:03 np0005481012 python3[49800]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:09:03 np0005481012 python3[49800]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 --format json Oct 11 08:09:03 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:09:03 np0005481012 python3[49800]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 -q --tls-verify=false Oct 11 08:09:06 np0005481012 podman[49812]: 2025-10-11 08:09:03.809582831 +0000 UTC m=+0.048831204 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 Oct 11 08:09:06 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:09:06 np0005481012 python3[49800]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 3f76d3697c703d2332d9793a607c3ad5895f1e231f3d109c5894b6df0fc3e2d4 --format json Oct 11 08:09:06 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:09:07 np0005481012 python3[49935]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Oct 11 08:09:07 np0005481012 python3[49935]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 --format json Oct 11 08:09:07 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:09:07 np0005481012 python3[49935]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 -q --tls-verify=false Oct 11 08:09:10 np0005481012 podman[49948]: 2025-10-11 08:09:07.15128785 +0000 UTC m=+0.049460264 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 Oct 11 08:09:10 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:09:10 np0005481012 python3[49935]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 64ee247085a151b9b85535ec576fe4bfbffeda6b9cbe0d7a85dc8f1216ce65a0 --format json Oct 11 08:09:10 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:09:12 np0005481012 python3[50069]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:09:12 np0005481012 python3[50089]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:09:15 np0005481012 python3[50106]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:09:19 np0005481012 python3[50123]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:09:19 np0005481012 python3[50139]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:09:20 np0005481012 python3[50155]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:09:21 np0005481012 python3[50173]: ansible-certificate_request Invoked with name=redis dns=['np0005481012.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['redis/np0005481012.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep redis_tls_proxy)#012service_crt="/etc/pki/tls/certs/redis.crt"#012service_key="/etc/pki/tls/private/redis.key"#012# Copy the new cert from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new cert from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec "$container_name" chown memcached:memcached "$service_crt"#012podman exec "$container_name" chown memcached:memcached "$service_key"#012# Trigger a reload for stunnel to read the new certificate#012podman exec pkill -o -HUP stunnel#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:09:21 np0005481012 certmonger[38891]: 2025-10-11 08:09:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:21 np0005481012 certmonger[38891]: 2025-10-11 08:09:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:21 np0005481012 certmonger[38891]: 2025-10-11 08:09:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:21 np0005481012 certmonger[38891]: 2025-10-11 08:09:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:21 np0005481012 certmonger[38891]: 2025-10-11 08:09:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:21 np0005481012 certmonger[38891]: 2025-10-11 08:09:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:21 np0005481012 certmonger[38891]: 2025-10-11 08:09:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:21 np0005481012 certmonger[38891]: 2025-10-11 08:09:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:21 np0005481012 certmonger[38891]: 2025-10-11 08:09:21 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:22 np0005481012 certmonger[38891]: 2025-10-11 08:09:22 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:22 np0005481012 certmonger[38891]: 2025-10-11 08:09:22 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:22 np0005481012 certmonger[38891]: 2025-10-11 08:09:22 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:22 np0005481012 certmonger[38891]: 2025-10-11 08:09:22 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:22 np0005481012 certmonger[38891]: 2025-10-11 08:09:22 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:22 np0005481012 certmonger[38891]: 2025-10-11 08:09:22 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:22 np0005481012 certmonger[38891]: 2025-10-11 08:09:22 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:22 np0005481012 certmonger[38891]: 2025-10-11 08:09:22 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:22 np0005481012 certmonger[50183]: 2025-10-11 08:09:22 [50183] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481012.internalapi.ooo.test" for child. Oct 11 08:09:22 np0005481012 certmonger[50183]: 2025-10-11 08:09:22 [50183] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481012.internalapi.ooo.test Oct 11 08:09:22 np0005481012 certmonger[50183]: overcloud.internalapi.ooo.test Oct 11 08:09:22 np0005481012 certmonger[50183]: " for child. Oct 11 08:09:22 np0005481012 certmonger[50183]: 2025-10-11 08:09:22 [50183] Setting "CERTMONGER_REQ_PRINCIPAL" to "redis/np0005481012.internalapi.ooo.test@OOO.TEST Oct 11 08:09:22 np0005481012 certmonger[50183]: " for child. Oct 11 08:09:22 np0005481012 certmonger[50183]: 2025-10-11 08:09:22 [50183] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:09:22 np0005481012 certmonger[50183]: 2025-10-11 08:09:22 [50183] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:09:22 np0005481012 certmonger[50183]: MIID9DCCAtwCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDEyLmludGVybmFsYXBp Oct 11 08:09:22 np0005481012 certmonger[50183]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAh+4e1hpy Oct 11 08:09:22 np0005481012 certmonger[50183]: JwWSn+PgrXSEzlIgnhP6IDiyJapq+a37ea08RsNg7D+C786Cnac0+4Qc6zIPrtt8 Oct 11 08:09:22 np0005481012 certmonger[50183]: Hl/FpwDJKvEBp1lS8ZHHGvJ6Y4n5pKlXvHm0i5K0vwzaV1LOPqvC3Va7Xs0RVFpo Oct 11 08:09:22 np0005481012 certmonger[50183]: zNtxZ7sleE9nq7uFnE8tFneRkDVUgLzQtGjIog677zgjMc+0itLXVldD6zfrsuJd Oct 11 08:09:22 np0005481012 certmonger[50183]: iZiTPk++y9skwClvCTUFUXfPG7tnHqVXZXs0/QNKFB//pE0iUyHO4AFnQYdL0S75 Oct 11 08:09:22 np0005481012 certmonger[50183]: zkSWgtBlVahNpqMTqez2AH0jJF5EJRby367W3NGs5IFbNsZXTUvKeiUp5U5B5L6f Oct 11 08:09:22 np0005481012 certmonger[50183]: A/Kh+CMJpgSwQQIDAQABoIIBgTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:09:22 np0005481012 certmonger[50183]: ADEAMQAwADgAMAA5ADIAMTCCAVAGCSqGSIb3DQEJDjGCAUEwggE9MAsGA1UdDwQE Oct 11 08:09:22 np0005481012 certmonger[50183]: AwIFoDCB4QYDVR0RBIHZMIHWgiFucDAwMDU0ODEwMTIuaW50ZXJuYWxhcGkub29v Oct 11 08:09:22 np0005481012 certmonger[50183]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBABgorBgEEAYI3 Oct 11 08:09:22 np0005481012 certmonger[50183]: FAIDoDIMMHJlZGlzL25wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdEBP Oct 11 08:09:22 np0005481012 certmonger[50183]: T08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNUoTUwM6ADAgEBoSwwKhsF Oct 11 08:09:22 np0005481012 certmonger[50183]: cmVkaXMbIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDAdBgNVHSUE Oct 11 08:09:22 np0005481012 certmonger[50183]: FjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU Oct 11 08:09:22 np0005481012 certmonger[50183]: j6T9R3spukpMpCAZZbru9h0AD4YwDQYJKoZIhvcNAQELBQADggEBAGA39076iuUh Oct 11 08:09:22 np0005481012 certmonger[50183]: b1iToELUU0CSuUViRQQ0bmhkgD0AvGgee90H4kKXHuLghdc4Ljdc9uXNiJ4xpc99 Oct 11 08:09:22 np0005481012 certmonger[50183]: TUWtKcWkL43nj+tLLeTC998LucQkBf9QjAUxQqxCza4JDsZOM0vDstGweQXPj7ao Oct 11 08:09:22 np0005481012 certmonger[50183]: p4af4Q4D6VzxKbnxZTCaQeBL8+1veZgQyP2uQpxivuTWh9blBYXh6/B5z3gxGEuW Oct 11 08:09:22 np0005481012 certmonger[50183]: EBbETXNMJSfnSEZ0h1IdPUjDwwueN6jjtQfcz1AYzGmKQ2esXlChCDe2IGK5RRGg Oct 11 08:09:22 np0005481012 certmonger[50183]: 11JRJiH1dB4V82qf07GAyEOYtTW33G7UySAjtxhy/0fUXxA2CXJIL2/mDbG56vv1 Oct 11 08:09:22 np0005481012 certmonger[50183]: yd35ZH8FbyU= Oct 11 08:09:22 np0005481012 certmonger[50183]: -----END CERTIFICATE REQUEST----- Oct 11 08:09:22 np0005481012 certmonger[50183]: " for child. Oct 11 08:09:22 np0005481012 certmonger[50183]: 2025-10-11 08:09:22 [50183] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCH7h7WGnInBZKf4+CtdITOUiCeE/ogOLIlqmr5rft5rTxGw2DsP4LvzoKdpzT7hBzrMg+u23weX8WnAMkq8QGnWVLxkcca8npjifmkqVe8ebSLkrS/DNpXUs4+q8LdVrtezRFUWmjM23FnuyV4T2eru4WcTy0Wd5GQNVSAvNC0aMiiDrvvOCMxz7SK0tdWV0PrN+uy4l2JmJM+T77L2yTAKW8JNQVRd88bu2cepVdlezT9A0oUH/+kTSJTIc7gAWdBh0vRLvnORJaC0GVVqE2moxOp7PYAfSMkXkQlFvLfrtbc0azkgVs2xldNS8p6JSnlTkHkvp8D8qH4IwmmBLBBAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAUcG4ag2gtob3P1GNg8lC6LGXVMY6t2xOgTp132oiIWlzGHvBf3JemsnJuWllFFacXEpr25gXqDsFrMhxu8hnV/x+I4NxStQGng3ADQ3Xo7PerbaBymy5EvaELARZVpSEStn51VaY+I0oUAazvT7ZC5g7dXsbUWD4artpYZ4J9xGoRUoxEK0xU+73/HjR8HFu08KlvazH04x4msS7QDlhc1ws4ONX5Zz9qJywuZUnKL0qa0nY9hEdtDW0tZqNNhTuJcUGCFiC2vleXUR5ZKQpmf3UlSK8xzqIkSon1vi4uNspZpjD5BiMg/EQ92azHxZQfvj4BLsCgXwUEZ9uneYfoQ==" for child. Oct 11 08:09:22 np0005481012 certmonger[50183]: 2025-10-11 08:09:22 [50183] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAh+4e1hpyJwWSn+PgrXSEzlIgnhP6IDiyJapq+a37ea08RsNg7D+C786Cnac0+4Qc6zIPrtt8Hl/FpwDJKvEBp1lS8ZHHGvJ6Y4n5pKlXvHm0i5K0vwzaV1LOPqvC3Va7Xs0RVFpozNtxZ7sleE9nq7uFnE8tFneRkDVUgLzQtGjIog677zgjMc+0itLXVldD6zfrsuJdiZiTPk++y9skwClvCTUFUXfPG7tnHqVXZXs0/QNKFB//pE0iUyHO4AFnQYdL0S75zkSWgtBlVahNpqMTqez2AH0jJF5EJRby367W3NGs5IFbNsZXTUvKeiUp5U5B5L6fA/Kh+CMJpgSwQQIDAQAB" for child. Oct 11 08:09:22 np0005481012 certmonger[50183]: 2025-10-11 08:09:22 [50183] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:09:22 np0005481012 certmonger[50183]: 2025-10-11 08:09:22 [50183] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:09:22 np0005481012 certmonger[50183]: 2025-10-11 08:09:22 [50183] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:09:22 np0005481012 certmonger[50183]: 2025-10-11 08:09:22 [50183] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:09:22 np0005481012 certmonger[50183]: 2025-10-11 08:09:22 [50183] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:09:22 np0005481012 certmonger[38891]: 2025-10-11 08:09:22 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:22 np0005481012 certmonger[50183]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:09:23 np0005481012 certmonger[50183]: Certificate: "MIIFdzCCA9+gAwIBAgIBVzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4MDkyMloXDTI3MTAxMjA4MDkyMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIfuHtYacicFkp/j4K10hM5SIJ4T+iA4siWqavmt+3mtPEbDYOw/gu/Ogp2nNPuEHOsyD67bfB5fxacAySrxAadZUvGRxxryemOJ+aSpV7x5tIuStL8M2ldSzj6rwt1Wu17NEVRaaMzbcWe7JXhPZ6u7hZxPLRZ3kZA1VIC80LRoyKIOu+84IzHPtIrS11ZXQ+s367LiXYmYkz5PvsvbJMApbwk1BVF3zxu7Zx6lV2V7NP0DShQf/6RNIlMhzuABZ0GHS9Eu+c5EloLQZVWoTaajE6ns9gB9IyReRCUW8t+u1tzRrOSBWzbGV01LynolKeVOQeS+nwPyofgjCaYEsEECAwEAAaOCAggwggIEMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLVb/to7mHPye7c2gbMjfz+R0fvQMIHhBgNVHREEgdkwgdaCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcUAgOgMgwwcmVkaXMvbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVyZWRpcxshbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQBgOnvXLurkj5iNPK3IHi9N5cy1Rg+D6fm69jK514k7Z8FM1PJBwFE78IuaGctiY1+LRFRpw2NoOwyje5tCPwy2LtIWwp4yjjKqvKXsTSKmrkNCdC2R7FAa9AxtXxw2DpfoLsh22IGdrJLnuGJCGHlxdd2yIiLAlCIWCp0tCB8ozXrhl9gBy5pKsLbpDCCS8SsVQs2Ccdet+aMAIHrlDIagrvQ1R1IJ/FztqAkOIdNSG9pB2VW7YxOS1wEgtPxTMXTY3lEZW0naSccNq57rqypqmm1u8YAbmG5OJ7H1hrPRJOwAIGaSyAUIQhIVYgpTn95rMP4J9Eg6gvdbDXicmateCSgJrUwhXHRf2H0Rk77o+SMYhFJLRR6LKlk4XGIPYaXcPf4idHhhCbBZ4NoZyWRGBhxjG0rNdlemusVZlIHxqaQIOx1Ns1u/3AW13XlWypYrqxrDDH362tuyqQew2XFSrXgHV2+hv2/cTL6FkJZNDQQKnRui1BU+CpUuP0L6OX0=" Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Certificate submission still ongoing. Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Certificate submission attempt complete. Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Child status = 0. Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Child output: Oct 11 08:09:23 np0005481012 certmonger[38891]: "-----BEGIN CERTIFICATE----- Oct 11 08:09:23 np0005481012 certmonger[38891]: MIIFdzCCA9+gAwIBAgIBVzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:09:23 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:09:23 np0005481012 certmonger[38891]: MDkyMloXDTI3MTAxMjA4MDkyMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:09:23 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:09:23 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAIfuHtYacicFkp/j4K10hM5SIJ4T+iA4siWq Oct 11 08:09:23 np0005481012 certmonger[38891]: avmt+3mtPEbDYOw/gu/Ogp2nNPuEHOsyD67bfB5fxacAySrxAadZUvGRxxryemOJ Oct 11 08:09:23 np0005481012 certmonger[38891]: +aSpV7x5tIuStL8M2ldSzj6rwt1Wu17NEVRaaMzbcWe7JXhPZ6u7hZxPLRZ3kZA1 Oct 11 08:09:23 np0005481012 certmonger[38891]: VIC80LRoyKIOu+84IzHPtIrS11ZXQ+s367LiXYmYkz5PvsvbJMApbwk1BVF3zxu7 Oct 11 08:09:23 np0005481012 certmonger[38891]: Zx6lV2V7NP0DShQf/6RNIlMhzuABZ0GHS9Eu+c5EloLQZVWoTaajE6ns9gB9IyRe Oct 11 08:09:23 np0005481012 certmonger[38891]: RCUW8t+u1tzRrOSBWzbGV01LynolKeVOQeS+nwPyofgjCaYEsEECAwEAAaOCAggw Oct 11 08:09:23 np0005481012 certmonger[38891]: ggIEMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:09:23 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:09:23 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:09:23 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:09:23 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:09:23 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLVb/to7mHPye7c2gbMjfz+R Oct 11 08:09:23 np0005481012 certmonger[38891]: 0fvQMIHhBgNVHREEgdkwgdaCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:09:23 np0005481012 certmonger[38891]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Oct 11 08:09:23 np0005481012 certmonger[38891]: AgOgMgwwcmVkaXMvbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0QE9P Oct 11 08:09:23 np0005481012 certmonger[38891]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVy Oct 11 08:09:23 np0005481012 certmonger[38891]: ZWRpcxshbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Oct 11 08:09:23 np0005481012 certmonger[38891]: DQEBCwUAA4IBgQBgOnvXLurkj5iNPK3IHi9N5cy1Rg+D6fm69jK514k7Z8FM1PJB Oct 11 08:09:23 np0005481012 certmonger[38891]: wFE78IuaGctiY1+LRFRpw2NoOwyje5tCPwy2LtIWwp4yjjKqvKXsTSKmrkNCdC2R Oct 11 08:09:23 np0005481012 certmonger[38891]: 7FAa9AxtXxw2DpfoLsh22IGdrJLnuGJCGHlxdd2yIiLAlCIWCp0tCB8ozXrhl9gB Oct 11 08:09:23 np0005481012 certmonger[38891]: y5pKsLbpDCCS8SsVQs2Ccdet+aMAIHrlDIagrvQ1R1IJ/FztqAkOIdNSG9pB2VW7 Oct 11 08:09:23 np0005481012 certmonger[38891]: YxOS1wEgtPxTMXTY3lEZW0naSccNq57rqypqmm1u8YAbmG5OJ7H1hrPRJOwAIGaS Oct 11 08:09:23 np0005481012 certmonger[38891]: yAUIQhIVYgpTn95rMP4J9Eg6gvdbDXicmateCSgJrUwhXHRf2H0Rk77o+SMYhFJL Oct 11 08:09:23 np0005481012 certmonger[38891]: RR6LKlk4XGIPYaXcPf4idHhhCbBZ4NoZyWRGBhxjG0rNdlemusVZlIHxqaQIOx1N Oct 11 08:09:23 np0005481012 certmonger[38891]: s1u/3AW13XlWypYrqxrDDH362tuyqQew2XFSrXgHV2+hv2/cTL6FkJZNDQQKnRui Oct 11 08:09:23 np0005481012 certmonger[38891]: 1BU+CpUuP0L6OX0= Oct 11 08:09:23 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:09:23 np0005481012 certmonger[38891]: " Oct 11 08:09:23 np0005481012 certmonger[50185]: 2025-10-11 08:09:23 [50185] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:09:23 np0005481012 certmonger[50185]: MIIFdzCCA9+gAwIBAgIBVzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:09:23 np0005481012 certmonger[50185]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:09:23 np0005481012 certmonger[50185]: MDkyMloXDTI3MTAxMjA4MDkyMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:09:23 np0005481012 certmonger[50185]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:09:23 np0005481012 certmonger[50185]: hvcNAQEBBQADggEPADCCAQoCggEBAIfuHtYacicFkp/j4K10hM5SIJ4T+iA4siWq Oct 11 08:09:23 np0005481012 certmonger[50185]: avmt+3mtPEbDYOw/gu/Ogp2nNPuEHOsyD67bfB5fxacAySrxAadZUvGRxxryemOJ Oct 11 08:09:23 np0005481012 certmonger[50185]: +aSpV7x5tIuStL8M2ldSzj6rwt1Wu17NEVRaaMzbcWe7JXhPZ6u7hZxPLRZ3kZA1 Oct 11 08:09:23 np0005481012 certmonger[50185]: VIC80LRoyKIOu+84IzHPtIrS11ZXQ+s367LiXYmYkz5PvsvbJMApbwk1BVF3zxu7 Oct 11 08:09:23 np0005481012 certmonger[50185]: Zx6lV2V7NP0DShQf/6RNIlMhzuABZ0GHS9Eu+c5EloLQZVWoTaajE6ns9gB9IyRe Oct 11 08:09:23 np0005481012 certmonger[50185]: RCUW8t+u1tzRrOSBWzbGV01LynolKeVOQeS+nwPyofgjCaYEsEECAwEAAaOCAggw Oct 11 08:09:23 np0005481012 certmonger[50185]: ggIEMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:09:23 np0005481012 certmonger[50185]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:09:23 np0005481012 certmonger[50185]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:09:23 np0005481012 certmonger[50185]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:09:23 np0005481012 certmonger[50185]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:09:23 np0005481012 certmonger[50185]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLVb/to7mHPye7c2gbMjfz+R Oct 11 08:09:23 np0005481012 certmonger[50185]: 0fvQMIHhBgNVHREEgdkwgdaCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:09:23 np0005481012 certmonger[50185]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Oct 11 08:09:23 np0005481012 certmonger[50185]: AgOgMgwwcmVkaXMvbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0QE9P Oct 11 08:09:23 np0005481012 certmonger[50185]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVy Oct 11 08:09:23 np0005481012 certmonger[50185]: ZWRpcxshbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Oct 11 08:09:23 np0005481012 certmonger[50185]: DQEBCwUAA4IBgQBgOnvXLurkj5iNPK3IHi9N5cy1Rg+D6fm69jK514k7Z8FM1PJB Oct 11 08:09:23 np0005481012 certmonger[50185]: wFE78IuaGctiY1+LRFRpw2NoOwyje5tCPwy2LtIWwp4yjjKqvKXsTSKmrkNCdC2R Oct 11 08:09:23 np0005481012 certmonger[50185]: 7FAa9AxtXxw2DpfoLsh22IGdrJLnuGJCGHlxdd2yIiLAlCIWCp0tCB8ozXrhl9gB Oct 11 08:09:23 np0005481012 certmonger[50185]: y5pKsLbpDCCS8SsVQs2Ccdet+aMAIHrlDIagrvQ1R1IJ/FztqAkOIdNSG9pB2VW7 Oct 11 08:09:23 np0005481012 certmonger[50185]: YxOS1wEgtPxTMXTY3lEZW0naSccNq57rqypqmm1u8YAbmG5OJ7H1hrPRJOwAIGaS Oct 11 08:09:23 np0005481012 certmonger[50185]: yAUIQhIVYgpTn95rMP4J9Eg6gvdbDXicmateCSgJrUwhXHRf2H0Rk77o+SMYhFJL Oct 11 08:09:23 np0005481012 certmonger[50185]: RR6LKlk4XGIPYaXcPf4idHhhCbBZ4NoZyWRGBhxjG0rNdlemusVZlIHxqaQIOx1N Oct 11 08:09:23 np0005481012 certmonger[50185]: s1u/3AW13XlWypYrqxrDDH362tuyqQew2XFSrXgHV2+hv2/cTL6FkJZNDQQKnRui Oct 11 08:09:23 np0005481012 certmonger[50185]: 1BU+CpUuP0L6OX0= Oct 11 08:09:23 np0005481012 certmonger[50185]: -----END CERTIFICATE----- Oct 11 08:09:23 np0005481012 certmonger[50185]: ". Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Certificate submission still ongoing. Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Certificate submission postprocessing complete. Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Child status = 0. Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Child output: Oct 11 08:09:23 np0005481012 certmonger[38891]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFdzCCA9+gAwIBAgIBVzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u\nVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4\nMDkyMloXDTI3MTAxMjA4MDkyMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV\nBAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI\nhvcNAQEBBQADggEPADCCAQoCggEBAIfuHtYacicFkp/j4K10hM5SIJ4T+iA4siWq\navmt+3mtPEbDYOw/gu/Ogp2nNPuEHOsyD67bfB5fxacAySrxAadZUvGRxxryemOJ\n+aSpV7x5tIuStL8M2ldSzj6rwt1Wu17NEVRaaMzbcWe7JXhPZ6u7hZxPLRZ3kZA1\nVIC80LRoyKIOu+84IzHPtIrS11ZXQ+s367LiXYmYkz5PvsvbJMApbwk1BVF3zxu7\nZx6lV2V7NP0DShQf/6RNIlMhzuABZ0GHS9Eu+c5EloLQZVWoTaajE6ns9gB9IyRe\nRCUW8t+u1tzRrOSBWzbGV01LynolKeVOQeS+nwPyofgjCaYEsEECAwEAAaOCAggw\nggIEMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB\nBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw\nMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw\ncwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js\nL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD\nZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLVb/to7mHPye7c2gbMjfz+R\n0fvQMIHhBgNVHREEgdkwgdaCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u\ndGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU\nAgOgMgwwcmVkaXMvbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0QE9P\nTy5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVy\nZWRpcxshbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3\nDQEBCwUAA4IBgQBgOnvXLurkj5iNPK3IHi9N5cy1Rg+D6fm69jK514k7Z8FM1PJB\nwFE78IuaGctiY1+LRFRpw2NoOwyje5tCPwy2LtIWwp4yjjKqvKXsTSKmrkNCdC2R\n7FAa9AxtXxw2DpfoLsh22IGdrJLnuGJCGHlxdd2yIiLAlCIWCp0tCB8ozXrhl9gB\ny5pKsLbpDCCS8SsVQs2Ccdet+aMAIHrlDIagrvQ1R1IJ/FztqAkOIdNSG9pB2VW7\nYxOS1wEgtPxTMXTY3lEZW0naSccNq57rqypqmm1u8YAbmG5OJ7H1hrPRJOwAIGaS\nyAUIQhIVYgpTn95rMP4J9Eg6gvdbDXicmateCSgJrUwhXHRf2H0Rk77o+SMYhFJL\nRR6LKlk4XGIPYaXcPf4idHhhCbBZ4NoZyWRGBhxjG0rNdlemusVZlIHxqaQIOx1N\ns1u/3AW13XlWypYrqxrDDH362tuyqQew2XFSrXgHV2+hv2/cTL6FkJZNDQQKnRui\n1BU+CpUuP0L6OX0=\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:09:23 np0005481012 certmonger[38891]: " Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:09:23 np0005481012 certmonger[38891]: MIIFdzCCA9+gAwIBAgIBVzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:09:23 np0005481012 certmonger[38891]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:09:23 np0005481012 certmonger[38891]: MDkyMloXDTI3MTAxMjA4MDkyMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:09:23 np0005481012 certmonger[38891]: BAMMIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:09:23 np0005481012 certmonger[38891]: hvcNAQEBBQADggEPADCCAQoCggEBAIfuHtYacicFkp/j4K10hM5SIJ4T+iA4siWq Oct 11 08:09:23 np0005481012 certmonger[38891]: avmt+3mtPEbDYOw/gu/Ogp2nNPuEHOsyD67bfB5fxacAySrxAadZUvGRxxryemOJ Oct 11 08:09:23 np0005481012 certmonger[38891]: +aSpV7x5tIuStL8M2ldSzj6rwt1Wu17NEVRaaMzbcWe7JXhPZ6u7hZxPLRZ3kZA1 Oct 11 08:09:23 np0005481012 certmonger[38891]: VIC80LRoyKIOu+84IzHPtIrS11ZXQ+s367LiXYmYkz5PvsvbJMApbwk1BVF3zxu7 Oct 11 08:09:23 np0005481012 certmonger[38891]: Zx6lV2V7NP0DShQf/6RNIlMhzuABZ0GHS9Eu+c5EloLQZVWoTaajE6ns9gB9IyRe Oct 11 08:09:23 np0005481012 certmonger[38891]: RCUW8t+u1tzRrOSBWzbGV01LynolKeVOQeS+nwPyofgjCaYEsEECAwEAAaOCAggw Oct 11 08:09:23 np0005481012 certmonger[38891]: ggIEMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:09:23 np0005481012 certmonger[38891]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:09:23 np0005481012 certmonger[38891]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:09:23 np0005481012 certmonger[38891]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:09:23 np0005481012 certmonger[38891]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:09:23 np0005481012 certmonger[38891]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLVb/to7mHPye7c2gbMjfz+R Oct 11 08:09:23 np0005481012 certmonger[38891]: 0fvQMIHhBgNVHREEgdkwgdaCIW5wMDAwNTQ4MTAxMi5pbnRlcm5hbGFwaS5vb28u Oct 11 08:09:23 np0005481012 certmonger[38891]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Oct 11 08:09:23 np0005481012 certmonger[38891]: AgOgMgwwcmVkaXMvbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0QE9P Oct 11 08:09:23 np0005481012 certmonger[38891]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVy Oct 11 08:09:23 np0005481012 certmonger[38891]: ZWRpcxshbnAwMDA1NDgxMDEyLmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Oct 11 08:09:23 np0005481012 certmonger[38891]: DQEBCwUAA4IBgQBgOnvXLurkj5iNPK3IHi9N5cy1Rg+D6fm69jK514k7Z8FM1PJB Oct 11 08:09:23 np0005481012 certmonger[38891]: wFE78IuaGctiY1+LRFRpw2NoOwyje5tCPwy2LtIWwp4yjjKqvKXsTSKmrkNCdC2R Oct 11 08:09:23 np0005481012 certmonger[38891]: 7FAa9AxtXxw2DpfoLsh22IGdrJLnuGJCGHlxdd2yIiLAlCIWCp0tCB8ozXrhl9gB Oct 11 08:09:23 np0005481012 certmonger[38891]: y5pKsLbpDCCS8SsVQs2Ccdet+aMAIHrlDIagrvQ1R1IJ/FztqAkOIdNSG9pB2VW7 Oct 11 08:09:23 np0005481012 certmonger[38891]: YxOS1wEgtPxTMXTY3lEZW0naSccNq57rqypqmm1u8YAbmG5OJ7H1hrPRJOwAIGaS Oct 11 08:09:23 np0005481012 certmonger[38891]: yAUIQhIVYgpTn95rMP4J9Eg6gvdbDXicmateCSgJrUwhXHRf2H0Rk77o+SMYhFJL Oct 11 08:09:23 np0005481012 certmonger[38891]: RR6LKlk4XGIPYaXcPf4idHhhCbBZ4NoZyWRGBhxjG0rNdlemusVZlIHxqaQIOx1N Oct 11 08:09:23 np0005481012 certmonger[38891]: s1u/3AW13XlWypYrqxrDDH362tuyqQew2XFSrXgHV2+hv2/cTL6FkJZNDQQKnRui Oct 11 08:09:23 np0005481012 certmonger[38891]: 1BU+CpUuP0L6OX0= Oct 11 08:09:23 np0005481012 certmonger[38891]: -----END CERTIFICATE----- Oct 11 08:09:23 np0005481012 certmonger[38891]: ". Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] No hooks set for pre-save command. Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:23 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:09:23 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:23 np0005481012 certmonger[50262]: Certificate in file "/etc/pki/tls/certs/redis.crt" issued by CA and saved. Oct 11 08:09:23 np0005481012 certmonger[38891]: 2025-10-11 08:09:23 [38891] Wrote to /var/lib/certmonger/requests/20251011080921 Oct 11 08:09:23 np0005481012 python3[50278]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:09:26 np0005481012 podman[50279]: 2025-10-11 08:09:24.063346263 +0000 UTC m=+0.048840525 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Oct 11 08:09:26 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:09:26 np0005481012 python3[50377]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 cluster.common.tag/redis:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:09:26 np0005481012 podman[50378]: 2025-10-11 08:09:26.556538528 +0000 UTC m=+0.054729124 image tag b966910419609da2f577c540a2e97890b8ed044ade282d8611d845762136555d cluster.common.tag/redis:pcmklatest Oct 11 08:09:26 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:09:27 np0005481012 python3[50406]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active rsyslog _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:09:27 np0005481012 python3[50455]: ansible-ansible.legacy.stat Invoked with path=/etc/rsyslog.d/openstack-swift.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 08:09:27 np0005481012 python3[50498]: ansible-ansible.legacy.copy Invoked with dest=/etc/rsyslog.d/openstack-swift.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760170167.2394104-118120-223878139163034/source _original_basename=tmpva_9787a follow=False checksum=c046f7cecbacf1ea879045a0e157e300a2726c73 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:09:28 np0005481012 python3[50528]: ansible-ansible.legacy.systemd Invoked with name=rsyslog state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 08:09:28 np0005481012 systemd[1]: Stopping System Logging Service... Oct 11 08:09:28 np0005481012 rsyslogd[40359]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="40359" x-info="https://www.rsyslog.com"] exiting on signal 15. Oct 11 08:09:28 np0005481012 systemd[1]: rsyslog.service: Deactivated successfully. Oct 11 08:09:28 np0005481012 systemd[1]: Stopped System Logging Service. Oct 11 08:09:28 np0005481012 systemd[1]: Starting System Logging Service... Oct 11 08:09:28 np0005481012 rsyslogd[50531]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="50531" x-info="https://www.rsyslog.com"] start Oct 11 08:09:28 np0005481012 systemd[1]: Started System Logging Service. Oct 11 08:09:28 np0005481012 rsyslogd[50531]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 08:09:29 np0005481012 python3[50550]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_1 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 08:09:30 np0005481012 ansible-async_wrapper.py[50722]: Invoked with 276038612520 3600 /home/tripleo-admin/.ansible/tmp/ansible-tmp-1760170170.4281065-118233-280680661429445/AnsiballZ_command.py _ Oct 11 08:09:31 np0005481012 ansible-async_wrapper.py[50725]: Starting module and watcher Oct 11 08:09:31 np0005481012 ansible-async_wrapper.py[50725]: Start watching 50726 (3600) Oct 11 08:09:31 np0005481012 ansible-async_wrapper.py[50726]: Start module (50726) Oct 11 08:09:31 np0005481012 ansible-async_wrapper.py[50722]: Return async_wrapper task started. Oct 11 08:09:31 np0005481012 python3[50746]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:09:36 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3600) Oct 11 08:09:40 np0005481012 puppet-user[50734]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 08:09:40 np0005481012 puppet-user[50734]: (file: /etc/puppet/hiera.yaml) Oct 11 08:09:40 np0005481012 puppet-user[50734]: Warning: Undefined variable '::deploy_config_name'; Oct 11 08:09:40 np0005481012 puppet-user[50734]: (file & line not available) Oct 11 08:09:40 np0005481012 puppet-user[50734]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 08:09:40 np0005481012 puppet-user[50734]: (file & line not available) Oct 11 08:09:41 np0005481012 puppet-user[50734]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/database/mysql/client.pp, line: 89, column: 8) Oct 11 08:09:41 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3595) Oct 11 08:09:41 np0005481012 puppet-user[50734]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/packages.pp, line: 39, column: 69) Oct 11 08:09:41 np0005481012 puppet-user[50734]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 0.38 seconds Oct 11 08:09:41 np0005481012 sssd_nss[38585]: Enumeration requested but not enabled Oct 11 08:09:41 np0005481012 puppet-user[50734]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Exec[directory-create-etc-my.cnf.d]/returns: executed successfully Oct 11 08:09:41 np0005481012 puppet-user[50734]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Oct 11 08:09:41 np0005481012 puppet-user[50734]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Oct 11 08:09:41 np0005481012 python3[50881]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:09:46 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3590) Oct 11 08:09:50 np0005481012 dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Oct 11 08:09:51 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3585) Oct 11 08:09:51 np0005481012 systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 11 08:09:51 np0005481012 systemd[1]: Starting man-db-cache-update.service... Oct 11 08:09:51 np0005481012 systemd[1]: Reloading. Oct 11 08:09:51 np0005481012 systemd-rc-local-generator[51034]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 08:09:51 np0005481012 systemd-sysv-generator[51039]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 08:09:51 np0005481012 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 08:09:51 np0005481012 systemd[1]: Queuing reload/restart jobs for marked units… Oct 11 08:09:52 np0005481012 python3[51282]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:09:53 np0005481012 rhsm-service[6472]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 08:09:53 np0005481012 systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 11 08:09:53 np0005481012 systemd[1]: Finished man-db-cache-update.service. Oct 11 08:09:53 np0005481012 systemd[1]: man-db-cache-update.service: Consumed 1.733s CPU time. Oct 11 08:09:53 np0005481012 systemd[1]: run-r48ba7a7f5b2d4c69bfd1cbceb6373930.service: Deactivated successfully. Oct 11 08:09:53 np0005481012 puppet-user[50734]: Notice: /Stage[main]/Pacemaker::Install/Package[pacemaker]/ensure: created Oct 11 08:09:56 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3580) Oct 11 08:09:59 np0005481012 systemd[1]: Reloading. Oct 11 08:09:59 np0005481012 systemd-rc-local-generator[52822]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 08:09:59 np0005481012 systemd-sysv-generator[52825]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 08:09:59 np0005481012 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 08:09:59 np0005481012 systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 11 08:09:59 np0005481012 systemd[1]: Starting man-db-cache-update.service... Oct 11 08:09:59 np0005481012 systemd[1]: Reloading. Oct 11 08:09:59 np0005481012 systemd-rc-local-generator[52915]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 08:09:59 np0005481012 systemd-sysv-generator[52920]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 08:09:59 np0005481012 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 08:09:59 np0005481012 systemd[1]: Queuing reload/restart jobs for marked units… Oct 11 08:10:00 np0005481012 systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 11 08:10:00 np0005481012 systemd[1]: Finished man-db-cache-update.service. Oct 11 08:10:00 np0005481012 systemd[1]: run-r74ae96b0758b4b219e1d197730bc7e15.service: Deactivated successfully. Oct 11 08:10:01 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3575) Oct 11 08:10:01 np0005481012 puppet-user[50734]: Notice: /Stage[main]/Pacemaker::Install/Package[pcs]/ensure: created Oct 11 08:10:01 np0005481012 puppet-user[50734]: Notice: /Stage[main]/Pacemaker::Corosync/File_line[pcsd_bind_addr]/ensure: created Oct 11 08:10:01 np0005481012 puppet-user[50734]: Notice: /Stage[main]/Pacemaker::Corosync/User[hacluster]/password: changed [redacted] to [redacted] Oct 11 08:10:01 np0005481012 puppet-user[50734]: Notice: /Stage[main]/Pacemaker::Corosync/User[hacluster]/groups: groups changed to ['haclient'] Oct 11 08:10:01 np0005481012 systemd[1]: Reloading. Oct 11 08:10:01 np0005481012 systemd-rc-local-generator[53004]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 08:10:01 np0005481012 systemd-sysv-generator[53010]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 08:10:01 np0005481012 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 08:10:01 np0005481012 systemd[1]: Starting PCS GUI and remote configuration interface (Ruby)... Oct 11 08:10:02 np0005481012 python3[53034]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:10:02 np0005481012 pcsd[53018]: 2025-10-11 08:10:02 +0000 INFO Notifying systemd we are running (socket /run/systemd/notify) Oct 11 08:10:02 np0005481012 systemd[1]: Started PCS GUI and remote configuration interface (Ruby). Oct 11 08:10:02 np0005481012 systemd[1]: Starting PCS GUI and remote configuration interface... Oct 11 08:10:03 np0005481012 systemd[1]: Started PCS GUI and remote configuration interface. Oct 11 08:10:03 np0005481012 systemd[1]: Reloading. Oct 11 08:10:04 np0005481012 systemd-rc-local-generator[53162]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 08:10:04 np0005481012 systemd-sysv-generator[53165]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 08:10:04 np0005481012 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 08:10:04 np0005481012 systemd[1]: Reloading. Oct 11 08:10:04 np0005481012 systemd-rc-local-generator[53196]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 08:10:04 np0005481012 systemd-sysv-generator[53201]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 08:10:04 np0005481012 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 08:10:04 np0005481012 puppet-user[50734]: Notice: /Stage[main]/Pacemaker::Service/Service[pcsd]/ensure: ensure changed 'stopped' to 'running' Oct 11 08:10:04 np0005481012 puppet-user[50734]: Notice: /Stage[main]/Pacemaker::Corosync/Exec[check-for-local-authentication]/returns: executed successfully Oct 11 08:10:06 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3570) Oct 11 08:10:11 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3565) Oct 11 08:10:12 np0005481012 python3[53247]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:10:16 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3560) Oct 11 08:10:21 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3555) Oct 11 08:10:23 np0005481012 python3[53280]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:10:26 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3550) Oct 11 08:10:31 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3545) Oct 11 08:10:33 np0005481012 python3[53313]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:10:36 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3540) Oct 11 08:10:41 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3535) Oct 11 08:10:43 np0005481012 python3[53346]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:10:46 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3530) Oct 11 08:10:51 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3525) Oct 11 08:10:53 np0005481012 python3[53379]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:10:56 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3520) Oct 11 08:11:01 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3515) Oct 11 08:11:04 np0005481012 python3[53412]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:11:05 np0005481012 sshd[53413]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:11:06 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3510) Oct 11 08:11:11 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3505) Oct 11 08:11:14 np0005481012 python3[53450]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:11:14 np0005481012 sshd[53451]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:11:16 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3500) Oct 11 08:11:21 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3495) Oct 11 08:11:24 np0005481012 sshd[53473]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:11:24 np0005481012 python3[53490]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:11:26 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3490) Oct 11 08:11:31 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3485) Oct 11 08:11:35 np0005481012 python3[53516]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:11:36 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3480) Oct 11 08:11:41 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3475) Oct 11 08:11:45 np0005481012 python3[53542]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:11:46 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3470) Oct 11 08:11:51 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3465) Oct 11 08:11:55 np0005481012 python3[53575]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:11:56 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3460) Oct 11 08:12:01 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3455) Oct 11 08:12:06 np0005481012 python3[53608]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:12:06 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3450) Oct 11 08:12:11 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3445) Oct 11 08:12:16 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3440) Oct 11 08:12:16 np0005481012 python3[53641]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:12:21 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3435) Oct 11 08:12:26 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3430) Oct 11 08:12:26 np0005481012 python3[53674]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:12:31 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3425) Oct 11 08:12:36 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3420) Oct 11 08:12:37 np0005481012 python3[53707]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:12:41 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3415) Oct 11 08:12:46 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3410) Oct 11 08:12:47 np0005481012 python3[53740]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:12:51 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3405) Oct 11 08:12:56 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3400) Oct 11 08:12:57 np0005481012 python3[53773]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:13:01 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3395) Oct 11 08:13:06 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3390) Oct 11 08:13:07 np0005481012 python3[53806]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:13:11 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3385) Oct 11 08:13:16 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3380) Oct 11 08:13:18 np0005481012 python3[53839]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:13:21 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3375) Oct 11 08:13:26 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3370) Oct 11 08:13:28 np0005481012 python3[53872]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:13:31 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3365) Oct 11 08:13:36 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3360) Oct 11 08:13:38 np0005481012 python3[53906]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:13:41 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3355) Oct 11 08:13:46 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3350) Oct 11 08:13:49 np0005481012 python3[53939]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:13:51 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3345) Oct 11 08:13:56 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3340) Oct 11 08:13:59 np0005481012 python3[53960]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:14:01 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3335) Oct 11 08:14:06 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3330) Oct 11 08:14:09 np0005481012 python3[53989]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:14:11 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3325) Oct 11 08:14:16 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3320) Oct 11 08:14:20 np0005481012 python3[54022]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:14:21 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3315) Oct 11 08:14:26 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3310) Oct 11 08:14:30 np0005481012 python3[54055]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:14:31 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3305) Oct 11 08:14:36 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3300) Oct 11 08:14:40 np0005481012 python3[54088]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:14:41 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3295) Oct 11 08:14:46 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3290) Oct 11 08:14:50 np0005481012 python3[54121]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:14:51 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3285) Oct 11 08:14:56 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3280) Oct 11 08:15:01 np0005481012 python3[54154]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:15:01 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3275) Oct 11 08:15:06 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3270) Oct 11 08:15:11 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3265) Oct 11 08:15:11 np0005481012 python3[54187]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:15:16 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3260) Oct 11 08:15:21 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3255) Oct 11 08:15:21 np0005481012 python3[54220]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:15:26 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3250) Oct 11 08:15:31 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3245) Oct 11 08:15:32 np0005481012 python3[54253]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:15:36 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3240) Oct 11 08:15:41 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3235) Oct 11 08:15:42 np0005481012 python3[54286]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:15:46 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3230) Oct 11 08:15:51 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3225) Oct 11 08:15:52 np0005481012 python3[54319]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:15:56 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3220) Oct 11 08:16:01 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3215) Oct 11 08:16:03 np0005481012 python3[54354]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:16:06 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3210) Oct 11 08:16:11 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3205) Oct 11 08:16:13 np0005481012 python3[54377]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:16:16 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3200) Oct 11 08:16:21 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3195) Oct 11 08:16:23 np0005481012 python3[54404]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:16:26 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3190) Oct 11 08:16:31 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3185) Oct 11 08:16:33 np0005481012 python3[54437]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:16:36 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3180) Oct 11 08:16:41 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3175) Oct 11 08:16:44 np0005481012 python3[54470]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:16:46 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3170) Oct 11 08:16:51 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3165) Oct 11 08:16:54 np0005481012 python3[54503]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:16:56 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3160) Oct 11 08:17:01 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3155) Oct 11 08:17:04 np0005481012 python3[54536]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:17:06 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3150) Oct 11 08:17:11 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3145) Oct 11 08:17:15 np0005481012 python3[54570]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:17:16 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3140) Oct 11 08:17:21 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3135) Oct 11 08:17:25 np0005481012 python3[54603]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:17:26 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3130) Oct 11 08:17:31 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3125) Oct 11 08:17:35 np0005481012 python3[54636]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:17:36 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3120) Oct 11 08:17:41 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3115) Oct 11 08:17:45 np0005481012 python3[54669]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:17:46 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3110) Oct 11 08:17:51 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3105) Oct 11 08:17:56 np0005481012 python3[54702]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:17:56 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3100) Oct 11 08:18:01 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3095) Oct 11 08:18:06 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3090) Oct 11 08:18:06 np0005481012 python3[54735]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:18:11 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3085) Oct 11 08:18:16 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3080) Oct 11 08:18:16 np0005481012 python3[54768]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:18:21 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3075) Oct 11 08:18:26 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3070) Oct 11 08:18:27 np0005481012 python3[54801]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:18:31 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3065) Oct 11 08:18:36 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3060) Oct 11 08:18:37 np0005481012 python3[54819]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:18:41 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3055) Oct 11 08:18:46 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3050) Oct 11 08:18:47 np0005481012 python3[54850]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:18:51 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3045) Oct 11 08:18:56 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3040) Oct 11 08:18:58 np0005481012 python3[54884]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:19:01 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3035) Oct 11 08:19:06 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3030) Oct 11 08:19:08 np0005481012 python3[54917]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:19:11 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3025) Oct 11 08:19:16 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3020) Oct 11 08:19:18 np0005481012 python3[54950]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:19:21 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3015) Oct 11 08:19:26 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3010) Oct 11 08:19:28 np0005481012 python3[54983]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:19:31 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3005) Oct 11 08:19:36 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (3000) Oct 11 08:19:39 np0005481012 python3[55016]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:19:41 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2995) Oct 11 08:19:46 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2990) Oct 11 08:19:49 np0005481012 python3[55049]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:19:51 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2985) Oct 11 08:19:56 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2980) Oct 11 08:19:59 np0005481012 python3[55082]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:20:01 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2975) Oct 11 08:20:06 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2970) Oct 11 08:20:10 np0005481012 python3[55115]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:20:11 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2965) Oct 11 08:20:16 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2960) Oct 11 08:20:20 np0005481012 python3[55148]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:20:21 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2955) Oct 11 08:20:26 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2950) Oct 11 08:20:27 np0005481012 sshd[55149]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:20:30 np0005481012 python3[55185]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:20:31 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2945) Oct 11 08:20:36 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2940) Oct 11 08:20:37 np0005481012 sshd[55187]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:20:41 np0005481012 python3[55222]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:20:41 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2935) Oct 11 08:20:46 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2930) Oct 11 08:20:48 np0005481012 sshd[55225]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:20:51 np0005481012 python3[55250]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:20:51 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2925) Oct 11 08:20:56 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2920) Oct 11 08:21:01 np0005481012 python3[55278]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:21:01 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2915) Oct 11 08:21:06 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2910) Oct 11 08:21:11 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2905) Oct 11 08:21:11 np0005481012 python3[55311]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:21:16 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2900) Oct 11 08:21:21 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2895) Oct 11 08:21:22 np0005481012 python3[55344]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:21:26 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2890) Oct 11 08:21:31 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2885) Oct 11 08:21:32 np0005481012 python3[55378]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:21:36 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2880) Oct 11 08:21:41 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2875) Oct 11 08:21:42 np0005481012 python3[55412]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:21:46 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2870) Oct 11 08:21:51 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2865) Oct 11 08:21:53 np0005481012 python3[55445]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:21:56 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2860) Oct 11 08:22:01 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2855) Oct 11 08:22:03 np0005481012 python3[55478]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:22:06 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2850) Oct 11 08:22:11 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2845) Oct 11 08:22:13 np0005481012 python3[55511]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:22:16 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2840) Oct 11 08:22:21 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2835) Oct 11 08:22:24 np0005481012 python3[55544]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:22:26 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2830) Oct 11 08:22:31 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2825) Oct 11 08:22:34 np0005481012 python3[55577]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:22:36 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2820) Oct 11 08:22:41 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2815) Oct 11 08:22:44 np0005481012 python3[55610]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:22:46 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2810) Oct 11 08:22:51 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2805) Oct 11 08:22:54 np0005481012 python3[55643]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:22:56 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2800) Oct 11 08:23:01 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2795) Oct 11 08:23:05 np0005481012 python3[55674]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:23:06 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2790) Oct 11 08:23:11 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2785) Oct 11 08:23:15 np0005481012 python3[55694]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:23:16 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2780) Oct 11 08:23:21 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2775) Oct 11 08:23:25 np0005481012 python3[55725]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:23:26 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2770) Oct 11 08:23:31 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2765) Oct 11 08:23:36 np0005481012 python3[55758]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:23:36 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2760) Oct 11 08:23:41 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2755) Oct 11 08:23:46 np0005481012 python3[55791]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:23:46 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2750) Oct 11 08:23:51 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2745) Oct 11 08:23:56 np0005481012 python3[55824]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:23:56 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2740) Oct 11 08:24:01 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2735) Oct 11 08:24:06 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2730) Oct 11 08:24:06 np0005481012 python3[55857]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:24:11 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2725) Oct 11 08:24:16 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2720) Oct 11 08:24:17 np0005481012 python3[55890]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:24:21 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2715) Oct 11 08:24:26 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2710) Oct 11 08:24:27 np0005481012 python3[55924]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:24:31 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2705) Oct 11 08:24:36 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2700) Oct 11 08:24:37 np0005481012 python3[55957]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:24:41 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2695) Oct 11 08:24:46 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2690) Oct 11 08:24:48 np0005481012 python3[55990]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:24:51 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2685) Oct 11 08:24:56 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2680) Oct 11 08:24:58 np0005481012 python3[56023]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:25:02 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2675) Oct 11 08:25:07 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2670) Oct 11 08:25:08 np0005481012 python3[56056]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:25:12 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2665) Oct 11 08:25:17 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2660) Oct 11 08:25:19 np0005481012 python3[56089]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:25:19 np0005481012 systemd[1]: session-14.scope: Deactivated successfully. Oct 11 08:25:19 np0005481012 systemd[1]: session-14.scope: Consumed 2.930s CPU time. Oct 11 08:25:19 np0005481012 systemd-logind[36317]: Session 14 logged out. Waiting for processes to exit. Oct 11 08:25:19 np0005481012 systemd-logind[36317]: Removed session 14. Oct 11 08:25:22 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2655) Oct 11 08:25:27 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2650) Oct 11 08:25:29 np0005481012 python3[56107]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:25:30 np0005481012 systemd[1]: Stopping User Manager for UID 1000... Oct 11 08:25:30 np0005481012 systemd[4178]: Activating special unit Exit the Session... Oct 11 08:25:30 np0005481012 systemd[4178]: Stopping podman-pause-c8f18eb1.scope... Oct 11 08:25:30 np0005481012 systemd[4178]: Removed slice User Background Tasks Slice. Oct 11 08:25:30 np0005481012 systemd[4178]: Stopped target Main User Target. Oct 11 08:25:30 np0005481012 systemd[4178]: Stopped target Basic System. Oct 11 08:25:30 np0005481012 systemd[4178]: Stopped target Paths. Oct 11 08:25:30 np0005481012 systemd[4178]: Stopped target Sockets. Oct 11 08:25:30 np0005481012 systemd[4178]: Stopped target Timers. Oct 11 08:25:30 np0005481012 systemd[4178]: Stopped Mark boot as successful after the user session has run 2 minutes. Oct 11 08:25:30 np0005481012 systemd[4178]: Stopped Daily Cleanup of User's Temporary Directories. Oct 11 08:25:30 np0005481012 dbus-broker[18328]: Dispatched 3265 messages @ 1(±15)μs / message. Oct 11 08:25:30 np0005481012 systemd[4178]: Stopping D-Bus User Message Bus... Oct 11 08:25:30 np0005481012 systemd[4178]: Stopped Create User's Volatile Files and Directories. Oct 11 08:25:30 np0005481012 systemd[4178]: Stopped podman-pause-c8f18eb1.scope. Oct 11 08:25:30 np0005481012 systemd[4178]: Removed slice Slice /user. Oct 11 08:25:30 np0005481012 systemd[4178]: Stopped D-Bus User Message Bus. Oct 11 08:25:30 np0005481012 systemd[4178]: Closed D-Bus User Message Bus Socket. Oct 11 08:25:30 np0005481012 systemd[4178]: Removed slice User Application Slice. Oct 11 08:25:30 np0005481012 systemd[4178]: Reached target Shutdown. Oct 11 08:25:30 np0005481012 systemd[4178]: Finished Exit the Session. Oct 11 08:25:30 np0005481012 systemd[4178]: Reached target Exit the Session. Oct 11 08:25:30 np0005481012 systemd[1]: user@1000.service: Deactivated successfully. Oct 11 08:25:30 np0005481012 systemd[1]: Stopped User Manager for UID 1000. Oct 11 08:25:30 np0005481012 systemd[1]: user@1000.service: Consumed 1.560s CPU time, read 20.0K from disk, written 4.0K to disk. Oct 11 08:25:32 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2645) Oct 11 08:25:37 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2640) Oct 11 08:25:39 np0005481012 python3[56138]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:25:42 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2635) Oct 11 08:25:47 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2630) Oct 11 08:25:50 np0005481012 python3[56171]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:25:52 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2625) Oct 11 08:25:57 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2620) Oct 11 08:26:00 np0005481012 python3[56204]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:26:02 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2615) Oct 11 08:26:07 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2610) Oct 11 08:26:10 np0005481012 python3[56237]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:26:12 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2605) Oct 11 08:26:17 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2600) Oct 11 08:26:20 np0005481012 python3[56270]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:26:22 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2595) Oct 11 08:26:27 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2590) Oct 11 08:26:31 np0005481012 python3[56303]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:26:32 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2585) Oct 11 08:26:37 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2580) Oct 11 08:26:41 np0005481012 python3[56337]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:26:42 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2575) Oct 11 08:26:47 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2570) Oct 11 08:26:51 np0005481012 python3[56370]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:26:52 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2565) Oct 11 08:26:54 np0005481012 sshd[56371]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:26:54 np0005481012 sshd[56372]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:26:57 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2560) Oct 11 08:26:58 np0005481012 sshd[56379]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:27:00 np0005481012 sshd[56393]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:27:01 np0005481012 krb5_child[56397]: Preauthentication failed Oct 11 08:27:01 np0005481012 krb5_child[56397]: Preauthentication failed Oct 11 08:27:02 np0005481012 python3[56413]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:27:02 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2555) Oct 11 08:27:05 np0005481012 sshd[56414]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:27:07 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2550) Oct 11 08:27:10 np0005481012 sshd[56431]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:27:12 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2545) Oct 11 08:27:12 np0005481012 python3[56451]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:27:13 np0005481012 sshd[56452]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:27:17 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2540) Oct 11 08:27:17 np0005481012 sshd[56454]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:27:22 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2535) Oct 11 08:27:22 np0005481012 sshd[56473]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:27:22 np0005481012 python3[56490]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:27:26 np0005481012 sshd[56491]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:27:27 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2530) Oct 11 08:27:27 np0005481012 sshd[56493]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:27:32 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2525) Oct 11 08:27:32 np0005481012 python3[56527]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:27:33 np0005481012 sshd[56529]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:27:34 np0005481012 krb5_child[56532]: Preauthentication failed Oct 11 08:27:34 np0005481012 krb5_child[56532]: Preauthentication failed Oct 11 08:27:37 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2520) Oct 11 08:27:38 np0005481012 sshd[56533]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:27:39 np0005481012 krb5_child[56536]: Preauthentication failed Oct 11 08:27:39 np0005481012 krb5_child[56536]: Preauthentication failed Oct 11 08:27:42 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2515) Oct 11 08:27:43 np0005481012 sshd[56558]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:27:43 np0005481012 python3[56557]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:27:47 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2510) Oct 11 08:27:48 np0005481012 sshd[56572]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:27:52 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2505) Oct 11 08:27:53 np0005481012 sshd[56574]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:27:53 np0005481012 python3[56591]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:27:57 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2500) Oct 11 08:27:58 np0005481012 sshd[56609]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:28:02 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2495) Oct 11 08:28:03 np0005481012 sshd[56611]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:28:03 np0005481012 python3[56628]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:28:07 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2490) Oct 11 08:28:08 np0005481012 sshd[56647]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:28:12 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2485) Oct 11 08:28:13 np0005481012 sshd[56649]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:28:14 np0005481012 python3[56666]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:28:17 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2480) Oct 11 08:28:18 np0005481012 sshd[56684]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:28:22 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2475) Oct 11 08:28:24 np0005481012 sshd[56697]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:28:24 np0005481012 python3[56703]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:28:27 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2470) Oct 11 08:28:29 np0005481012 sshd[56722]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:28:32 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2465) Oct 11 08:28:34 np0005481012 sshd[56725]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:28:34 np0005481012 python3[56742]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:28:35 np0005481012 krb5_child[56744]: Preauthentication failed Oct 11 08:28:35 np0005481012 krb5_child[56744]: Preauthentication failed Oct 11 08:28:37 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2460) Oct 11 08:28:39 np0005481012 sshd[56759]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:28:42 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2455) Oct 11 08:28:45 np0005481012 python3[56779]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:28:47 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2450) Oct 11 08:28:52 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2445) Oct 11 08:28:55 np0005481012 python3[56812]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:28:57 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2440) Oct 11 08:29:02 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2435) Oct 11 08:29:05 np0005481012 python3[56845]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:29:07 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2430) Oct 11 08:29:12 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2425) Oct 11 08:29:16 np0005481012 python3[56878]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:29:17 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2420) Oct 11 08:29:22 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2415) Oct 11 08:29:26 np0005481012 python3[56911]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:29:27 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2410) Oct 11 08:29:32 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2405) Oct 11 08:29:36 np0005481012 python3[56944]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:29:37 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2400) Oct 11 08:29:42 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2395) Oct 11 08:29:46 np0005481012 sshd[56962]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:29:46 np0005481012 python3[56979]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:29:47 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2390) Oct 11 08:29:52 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2385) Oct 11 08:29:57 np0005481012 python3[57006]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:29:57 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2380) Oct 11 08:29:57 np0005481012 sshd[57017]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:30:02 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2375) Oct 11 08:30:07 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2370) Oct 11 08:30:07 np0005481012 sshd[57038]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:30:07 np0005481012 python3[57037]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:30:12 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2365) Oct 11 08:30:17 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2360) Oct 11 08:30:17 np0005481012 python3[57075]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:30:22 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2355) Oct 11 08:30:27 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2350) Oct 11 08:30:28 np0005481012 python3[57108]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:30:32 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2345) Oct 11 08:30:37 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2340) Oct 11 08:30:38 np0005481012 python3[57141]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:30:42 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2335) Oct 11 08:30:47 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2330) Oct 11 08:30:48 np0005481012 python3[57175]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:30:52 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2325) Oct 11 08:30:57 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2320) Oct 11 08:30:59 np0005481012 python3[57208]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:31:02 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2315) Oct 11 08:31:07 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2310) Oct 11 08:31:09 np0005481012 python3[57241]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:31:12 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2305) Oct 11 08:31:17 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2300) Oct 11 08:31:19 np0005481012 python3[57274]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:31:22 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2295) Oct 11 08:31:27 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2290) Oct 11 08:31:29 np0005481012 python3[57307]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:31:32 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2285) Oct 11 08:31:37 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2280) Oct 11 08:31:40 np0005481012 python3[57340]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:31:42 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2275) Oct 11 08:31:47 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2270) Oct 11 08:31:50 np0005481012 python3[57373]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:31:52 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2265) Oct 11 08:31:57 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2260) Oct 11 08:32:00 np0005481012 python3[57407]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:32:02 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2255) Oct 11 08:32:07 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2250) Oct 11 08:32:11 np0005481012 python3[57430]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:32:12 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2245) Oct 11 08:32:17 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2240) Oct 11 08:32:21 np0005481012 python3[57456]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:32:22 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2235) Oct 11 08:32:27 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2230) Oct 11 08:32:31 np0005481012 python3[57489]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:32:32 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2225) Oct 11 08:32:37 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2220) Oct 11 08:32:41 np0005481012 python3[57522]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:32:42 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2215) Oct 11 08:32:47 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2210) Oct 11 08:32:52 np0005481012 python3[57555]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:32:52 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2205) Oct 11 08:32:57 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2200) Oct 11 08:33:02 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2195) Oct 11 08:33:02 np0005481012 python3[57588]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:33:07 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2190) Oct 11 08:33:12 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2185) Oct 11 08:33:12 np0005481012 python3[57621]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:33:17 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2180) Oct 11 08:33:22 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2175) Oct 11 08:33:23 np0005481012 python3[57654]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:33:27 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2170) Oct 11 08:33:32 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2165) Oct 11 08:33:33 np0005481012 python3[57687]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:33:37 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2160) Oct 11 08:33:42 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2155) Oct 11 08:33:43 np0005481012 python3[57721]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:33:47 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2150) Oct 11 08:33:52 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2145) Oct 11 08:33:54 np0005481012 python3[57754]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:33:57 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2140) Oct 11 08:34:02 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2135) Oct 11 08:34:04 np0005481012 python3[57787]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:34:07 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2130) Oct 11 08:34:12 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2125) Oct 11 08:34:14 np0005481012 python3[57820]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:34:17 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2120) Oct 11 08:34:22 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2115) Oct 11 08:34:24 np0005481012 python3[57843]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:34:27 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2110) Oct 11 08:34:32 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2105) Oct 11 08:34:35 np0005481012 python3[57872]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:34:37 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2100) Oct 11 08:34:42 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2095) Oct 11 08:34:45 np0005481012 python3[57902]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:34:46 np0005481012 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:2b:a5:c8 MACPROTO=0800 SRC=139.99.35.43 DST=38.102.83.145 LEN=60 TOS=0x00 PREC=0x00 TTL=45 ID=3928 DF PROTO=TCP SPT=59689 DPT=9090 SEQ=4267839642 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B40402080A1BBE3EC30000000001030307) Oct 11 08:34:47 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2090) Oct 11 08:34:47 np0005481012 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:2b:a5:c8 MACPROTO=0800 SRC=139.99.35.43 DST=38.102.83.145 LEN=60 TOS=0x00 PREC=0x00 TTL=45 ID=3929 DF PROTO=TCP SPT=59689 DPT=9090 SEQ=4267839642 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B40402080A1BBE42B70000000001030307) Oct 11 08:34:49 np0005481012 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:2b:a5:c8 MACPROTO=0800 SRC=139.99.35.43 DST=38.102.83.145 LEN=60 TOS=0x00 PREC=0x00 TTL=45 ID=3930 DF PROTO=TCP SPT=59689 DPT=9090 SEQ=4267839642 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B40402080A1BBE4A970000000001030307) Oct 11 08:34:52 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2085) Oct 11 08:34:53 np0005481012 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:2b:a5:c8 MACPROTO=0800 SRC=139.99.35.43 DST=38.102.83.145 LEN=60 TOS=0x00 PREC=0x00 TTL=45 ID=3931 DF PROTO=TCP SPT=59689 DPT=9090 SEQ=4267839642 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B40402080A1BBE5AD70000000001030307) Oct 11 08:34:55 np0005481012 python3[57935]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:34:57 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2080) Oct 11 08:35:01 np0005481012 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:2b:a5:c8 MACPROTO=0800 SRC=199.45.154.134 DST=38.102.83.145 LEN=60 TOS=0x08 PREC=0x40 TTL=47 ID=56317 DF PROTO=TCP SPT=36152 DPT=19885 SEQ=1980841161 ACK=0 WINDOW=42340 RES=0x00 SYN URGP=0 OPT (020405B40402080AB5B4F7F3000000000103030A) Oct 11 08:35:02 np0005481012 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:2b:a5:c8 MACPROTO=0800 SRC=139.99.35.43 DST=38.102.83.145 LEN=60 TOS=0x00 PREC=0x00 TTL=45 ID=3932 DF PROTO=TCP SPT=59689 DPT=9090 SEQ=4267839642 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B40402080A1BBE7AD70000000001030307) Oct 11 08:35:02 np0005481012 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:2b:a5:c8 MACPROTO=0800 SRC=199.45.154.134 DST=38.102.83.145 LEN=60 TOS=0x08 PREC=0x40 TTL=46 ID=56683 DF PROTO=TCP SPT=36172 DPT=19885 SEQ=3541141505 ACK=0 WINDOW=42340 RES=0x00 SYN URGP=0 OPT (020405B40402080AB5B4FBE0000000000103030A) Oct 11 08:35:02 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2075) Oct 11 08:35:03 np0005481012 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:2b:a5:c8 MACPROTO=0800 SRC=199.45.154.134 DST=38.102.83.145 LEN=60 TOS=0x08 PREC=0x40 TTL=46 ID=56684 DF PROTO=TCP SPT=36172 DPT=19885 SEQ=3541141505 ACK=0 WINDOW=42340 RES=0x00 SYN URGP=0 OPT (020405B40402080AB5B50006000000000103030A) Oct 11 08:35:03 np0005481012 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:2b:a5:c8 MACPROTO=0800 SRC=199.45.154.134 DST=38.102.83.145 LEN=60 TOS=0x08 PREC=0x40 TTL=47 ID=49084 DF PROTO=TCP SPT=36832 DPT=19885 SEQ=548800583 ACK=0 WINDOW=42340 RES=0x00 SYN URGP=0 OPT (020405B40402080AB5B5000B000000000103030A) Oct 11 08:35:04 np0005481012 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:2b:a5:c8 MACPROTO=0800 SRC=199.45.154.134 DST=38.102.83.145 LEN=60 TOS=0x08 PREC=0x40 TTL=47 ID=49085 DF PROTO=TCP SPT=36832 DPT=19885 SEQ=548800583 ACK=0 WINDOW=42340 RES=0x00 SYN URGP=0 OPT (020405B40402080AB5B50406000000000103030A) Oct 11 08:35:06 np0005481012 python3[57968]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:35:07 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2070) Oct 11 08:35:12 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2065) Oct 11 08:35:16 np0005481012 python3[58001]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:35:17 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2060) Oct 11 08:35:22 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2055) Oct 11 08:35:26 np0005481012 python3[58035]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:35:27 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2050) Oct 11 08:35:32 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2045) Oct 11 08:35:37 np0005481012 python3[58068]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:35:37 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2040) Oct 11 08:35:42 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2035) Oct 11 08:35:47 np0005481012 python3[58101]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:35:47 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2030) Oct 11 08:35:52 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2025) Oct 11 08:35:57 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2020) Oct 11 08:35:57 np0005481012 python3[58134]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:36:02 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2015) Oct 11 08:36:07 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2010) Oct 11 08:36:08 np0005481012 python3[58167]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:36:12 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2005) Oct 11 08:36:17 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (2000) Oct 11 08:36:18 np0005481012 python3[58200]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:36:22 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1995) Oct 11 08:36:27 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1990) Oct 11 08:36:28 np0005481012 python3[58233]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:36:32 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1985) Oct 11 08:36:37 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1980) Oct 11 08:36:38 np0005481012 python3[58255]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:36:42 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1975) Oct 11 08:36:47 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1970) Oct 11 08:36:49 np0005481012 python3[58285]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:36:52 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1965) Oct 11 08:36:57 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1960) Oct 11 08:36:59 np0005481012 python3[58315]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:37:02 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1955) Oct 11 08:37:07 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1950) Oct 11 08:37:09 np0005481012 python3[58348]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:37:12 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1945) Oct 11 08:37:17 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1940) Oct 11 08:37:20 np0005481012 python3[58381]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:37:22 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1935) Oct 11 08:37:27 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1930) Oct 11 08:37:30 np0005481012 python3[58414]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:37:32 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1925) Oct 11 08:37:37 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1920) Oct 11 08:37:40 np0005481012 python3[58447]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:37:42 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1915) Oct 11 08:37:47 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1910) Oct 11 08:37:51 np0005481012 python3[58480]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:37:52 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1905) Oct 11 08:37:57 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1900) Oct 11 08:38:01 np0005481012 python3[58513]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:38:02 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1895) Oct 11 08:38:07 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1890) Oct 11 08:38:11 np0005481012 python3[58546]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:38:12 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1885) Oct 11 08:38:17 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1880) Oct 11 08:38:21 np0005481012 python3[58579]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:38:22 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1875) Oct 11 08:38:27 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1870) Oct 11 08:38:32 np0005481012 python3[58612]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:38:32 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1865) Oct 11 08:38:37 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1860) Oct 11 08:38:42 np0005481012 python3[58645]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:38:42 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1855) Oct 11 08:38:47 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1850) Oct 11 08:38:52 np0005481012 python3[58668]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:38:52 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1845) Oct 11 08:38:57 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1840) Oct 11 08:39:02 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1835) Oct 11 08:39:03 np0005481012 python3[58696]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:39:07 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1830) Oct 11 08:39:09 np0005481012 sshd[58712]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:39:12 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1825) Oct 11 08:39:13 np0005481012 python3[58730]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:39:17 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1820) Oct 11 08:39:21 np0005481012 sshd[58750]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:39:22 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1815) Oct 11 08:39:23 np0005481012 python3[58768]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:39:27 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1810) Oct 11 08:39:30 np0005481012 sshd[58788]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:39:32 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1805) Oct 11 08:39:34 np0005481012 python3[58806]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:39:37 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1800) Oct 11 08:39:42 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1795) Oct 11 08:39:44 np0005481012 python3[58842]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:39:47 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1790) Oct 11 08:39:52 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1785) Oct 11 08:39:54 np0005481012 python3[58875]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:39:57 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1780) Oct 11 08:40:02 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1775) Oct 11 08:40:04 np0005481012 python3[58908]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:40:07 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1770) Oct 11 08:40:12 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1765) Oct 11 08:40:15 np0005481012 python3[58941]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:40:17 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1760) Oct 11 08:40:22 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1755) Oct 11 08:40:25 np0005481012 python3[58974]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:40:27 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1750) Oct 11 08:40:32 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1745) Oct 11 08:40:35 np0005481012 python3[59007]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:40:37 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1740) Oct 11 08:40:42 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1735) Oct 11 08:40:46 np0005481012 python3[59041]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:40:47 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1730) Oct 11 08:40:52 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1725) Oct 11 08:40:56 np0005481012 python3[59074]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:40:57 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1720) Oct 11 08:41:02 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1715) Oct 11 08:41:06 np0005481012 python3[59104]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:41:07 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1710) Oct 11 08:41:12 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1705) Oct 11 08:41:17 np0005481012 python3[59128]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:41:18 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1700) Oct 11 08:41:23 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1695) Oct 11 08:41:27 np0005481012 python3[59156]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:41:28 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1690) Oct 11 08:41:33 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1685) Oct 11 08:41:37 np0005481012 python3[59189]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:41:38 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1680) Oct 11 08:41:43 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1675) Oct 11 08:41:47 np0005481012 python3[59222]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:41:48 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1670) Oct 11 08:41:53 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1665) Oct 11 08:41:58 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1660) Oct 11 08:41:58 np0005481012 python3[59255]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:42:03 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1655) Oct 11 08:42:08 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1650) Oct 11 08:42:08 np0005481012 python3[59288]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:42:13 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1645) Oct 11 08:42:18 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1640) Oct 11 08:42:18 np0005481012 python3[59321]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:42:23 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1635) Oct 11 08:42:28 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1630) Oct 11 08:42:29 np0005481012 python3[59354]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:42:33 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1625) Oct 11 08:42:38 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1620) Oct 11 08:42:39 np0005481012 python3[59387]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:42:43 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1615) Oct 11 08:42:48 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1610) Oct 11 08:42:49 np0005481012 python3[59420]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:42:53 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1605) Oct 11 08:42:58 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1600) Oct 11 08:43:00 np0005481012 python3[59453]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:43:03 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1595) Oct 11 08:43:08 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1590) Oct 11 08:43:10 np0005481012 python3[59486]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:43:13 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1585) Oct 11 08:43:18 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1580) Oct 11 08:43:20 np0005481012 python3[59521]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:43:23 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1575) Oct 11 08:43:28 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1570) Oct 11 08:43:31 np0005481012 python3[59542]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:43:33 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1565) Oct 11 08:43:38 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1560) Oct 11 08:43:41 np0005481012 python3[59570]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:43:43 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1555) Oct 11 08:43:48 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1550) Oct 11 08:43:51 np0005481012 python3[59603]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:43:53 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1545) Oct 11 08:43:58 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1540) Oct 11 08:44:01 np0005481012 python3[59636]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:44:03 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1535) Oct 11 08:44:08 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1530) Oct 11 08:44:12 np0005481012 python3[59669]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:44:13 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1525) Oct 11 08:44:18 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1520) Oct 11 08:44:22 np0005481012 python3[59702]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:44:23 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1515) Oct 11 08:44:28 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1510) Oct 11 08:44:32 np0005481012 python3[59735]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:44:33 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1505) Oct 11 08:44:38 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1500) Oct 11 08:44:43 np0005481012 python3[59769]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:44:43 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1495) Oct 11 08:44:48 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1490) Oct 11 08:44:53 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1485) Oct 11 08:44:53 np0005481012 python3[59803]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:44:58 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1480) Oct 11 08:45:03 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1475) Oct 11 08:45:03 np0005481012 python3[59836]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:45:08 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1470) Oct 11 08:45:13 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1465) Oct 11 08:45:14 np0005481012 python3[59869]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:45:18 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1460) Oct 11 08:45:23 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1455) Oct 11 08:45:24 np0005481012 python3[59902]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:45:28 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1450) Oct 11 08:45:33 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1445) Oct 11 08:45:34 np0005481012 python3[59935]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:45:38 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1440) Oct 11 08:45:43 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1435) Oct 11 08:45:44 np0005481012 python3[59955]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:45:48 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1430) Oct 11 08:45:53 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1425) Oct 11 08:45:55 np0005481012 python3[59984]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:45:58 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1420) Oct 11 08:46:03 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1415) Oct 11 08:46:05 np0005481012 python3[60017]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:46:08 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1410) Oct 11 08:46:13 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1405) Oct 11 08:46:15 np0005481012 python3[60051]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:46:18 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1400) Oct 11 08:46:23 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1395) Oct 11 08:46:26 np0005481012 python3[60084]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:46:28 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1390) Oct 11 08:46:33 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1385) Oct 11 08:46:36 np0005481012 python3[60117]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:46:38 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1380) Oct 11 08:46:43 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1375) Oct 11 08:46:46 np0005481012 python3[60150]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:46:48 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1370) Oct 11 08:46:53 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1365) Oct 11 08:46:56 np0005481012 python3[60184]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:46:58 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1360) Oct 11 08:47:03 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1355) Oct 11 08:47:07 np0005481012 python3[60217]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:47:08 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1350) Oct 11 08:47:13 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1345) Oct 11 08:47:17 np0005481012 python3[60250]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:47:18 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1340) Oct 11 08:47:23 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1335) Oct 11 08:47:27 np0005481012 python3[60283]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:47:28 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1330) Oct 11 08:47:33 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1325) Oct 11 08:47:38 np0005481012 python3[60316]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:47:38 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1320) Oct 11 08:47:43 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1315) Oct 11 08:47:48 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1310) Oct 11 08:47:48 np0005481012 python3[60346]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:47:53 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1305) Oct 11 08:47:58 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1300) Oct 11 08:47:58 np0005481012 python3[60367]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:48:03 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1295) Oct 11 08:48:08 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1290) Oct 11 08:48:09 np0005481012 python3[60398]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:48:13 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1285) Oct 11 08:48:18 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1280) Oct 11 08:48:19 np0005481012 python3[60431]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:48:23 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1275) Oct 11 08:48:28 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1270) Oct 11 08:48:29 np0005481012 python3[60464]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:48:33 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1265) Oct 11 08:48:36 np0005481012 sshd[60482]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:48:38 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1260) Oct 11 08:48:39 np0005481012 python3[60500]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:48:43 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1255) Oct 11 08:48:48 np0005481012 sshd[60520]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:48:48 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1250) Oct 11 08:48:50 np0005481012 python3[60538]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:48:53 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1245) Oct 11 08:48:57 np0005481012 sshd[60558]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:48:58 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1240) Oct 11 08:49:00 np0005481012 python3[60576]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:49:03 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1235) Oct 11 08:49:08 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1230) Oct 11 08:49:10 np0005481012 python3[60611]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:49:13 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1225) Oct 11 08:49:18 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1220) Oct 11 08:49:21 np0005481012 python3[60644]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:49:23 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1215) Oct 11 08:49:28 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1210) Oct 11 08:49:31 np0005481012 python3[60677]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:49:33 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1205) Oct 11 08:49:38 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1200) Oct 11 08:49:41 np0005481012 python3[60710]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:49:43 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1195) Oct 11 08:49:48 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1190) Oct 11 08:49:51 np0005481012 python3[60743]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:49:53 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1185) Oct 11 08:49:58 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1180) Oct 11 08:50:02 np0005481012 python3[60770]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:50:03 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1175) Oct 11 08:50:08 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1170) Oct 11 08:50:12 np0005481012 python3[60794]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:50:13 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1165) Oct 11 08:50:18 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1160) Oct 11 08:50:22 np0005481012 python3[60825]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:50:23 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1155) Oct 11 08:50:28 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1150) Oct 11 08:50:33 np0005481012 python3[60858]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:50:33 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1145) Oct 11 08:50:38 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1140) Oct 11 08:50:43 np0005481012 python3[60891]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:50:43 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1135) Oct 11 08:50:48 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1130) Oct 11 08:50:53 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1125) Oct 11 08:50:53 np0005481012 python3[60924]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:50:58 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1120) Oct 11 08:51:03 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1115) Oct 11 08:51:04 np0005481012 python3[60957]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:51:08 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1110) Oct 11 08:51:13 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1105) Oct 11 08:51:14 np0005481012 python3[60990]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:51:18 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1100) Oct 11 08:51:23 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1095) Oct 11 08:51:24 np0005481012 python3[61023]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:51:28 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1090) Oct 11 08:51:33 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1085) Oct 11 08:51:34 np0005481012 python3[61056]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:51:38 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1080) Oct 11 08:51:43 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1075) Oct 11 08:51:45 np0005481012 python3[61090]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:51:48 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1070) Oct 11 08:51:53 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1065) Oct 11 08:51:55 np0005481012 python3[61123]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:51:58 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1060) Oct 11 08:52:03 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1055) Oct 11 08:52:05 np0005481012 python3[61153]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:52:08 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1050) Oct 11 08:52:13 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1045) Oct 11 08:52:16 np0005481012 python3[61176]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:52:18 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1040) Oct 11 08:52:23 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1035) Oct 11 08:52:26 np0005481012 python3[61206]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:52:28 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1030) Oct 11 08:52:33 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1025) Oct 11 08:52:36 np0005481012 python3[61239]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:52:38 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1020) Oct 11 08:52:43 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1015) Oct 11 08:52:47 np0005481012 python3[61272]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:52:48 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1010) Oct 11 08:52:53 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1005) Oct 11 08:52:57 np0005481012 python3[61305]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:52:58 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (1000) Oct 11 08:53:03 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (995) Oct 11 08:53:07 np0005481012 python3[61338]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:53:08 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (990) Oct 11 08:53:12 np0005481012 sshd[61353]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:53:13 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (985) Oct 11 08:53:18 np0005481012 python3[61376]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:53:18 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (980) Oct 11 08:53:23 np0005481012 systemd[1]: Starting dnf makecache... Oct 11 08:53:23 np0005481012 dnf[61391]: Updating Subscription Management repositories. Oct 11 08:53:23 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (975) Oct 11 08:53:25 np0005481012 dnf[61391]: Metadata cache refreshed recently. Oct 11 08:53:25 np0005481012 systemd[1]: dnf-makecache.service: Deactivated successfully. Oct 11 08:53:25 np0005481012 systemd[1]: Finished dnf makecache. Oct 11 08:53:25 np0005481012 systemd[1]: dnf-makecache.service: Consumed 2.004s CPU time. Oct 11 08:53:28 np0005481012 python3[61412]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:53:28 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (970) Oct 11 08:53:33 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (965) Oct 11 08:53:38 np0005481012 python3[61446]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:53:38 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (960) Oct 11 08:53:43 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (955) Oct 11 08:53:48 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (950) Oct 11 08:53:48 np0005481012 python3[61479]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:53:53 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (945) Oct 11 08:53:58 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (940) Oct 11 08:53:59 np0005481012 python3[61512]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:54:03 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (935) Oct 11 08:54:08 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (930) Oct 11 08:54:09 np0005481012 python3[61545]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:54:13 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (925) Oct 11 08:54:18 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (920) Oct 11 08:54:19 np0005481012 python3[61575]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:54:23 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (915) Oct 11 08:54:28 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (910) Oct 11 08:54:30 np0005481012 python3[61605]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:54:33 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (905) Oct 11 08:54:38 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (900) Oct 11 08:54:40 np0005481012 python3[61629]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:54:43 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (895) Oct 11 08:54:48 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (890) Oct 11 08:54:50 np0005481012 python3[61660]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:54:53 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (885) Oct 11 08:54:58 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (880) Oct 11 08:55:00 np0005481012 python3[61693]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:55:03 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (875) Oct 11 08:55:08 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (870) Oct 11 08:55:11 np0005481012 python3[61726]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:55:13 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (865) Oct 11 08:55:18 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (860) Oct 11 08:55:21 np0005481012 python3[61759]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:55:23 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (855) Oct 11 08:55:28 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (850) Oct 11 08:55:31 np0005481012 python3[61792]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:55:33 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (845) Oct 11 08:55:38 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (840) Oct 11 08:55:42 np0005481012 python3[61825]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:55:43 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (835) Oct 11 08:55:48 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (830) Oct 11 08:55:52 np0005481012 python3[61858]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:55:53 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (825) Oct 11 08:55:58 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (820) Oct 11 08:56:02 np0005481012 python3[61891]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:56:03 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (815) Oct 11 08:56:08 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (810) Oct 11 08:56:13 np0005481012 python3[61924]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:56:13 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (805) Oct 11 08:56:18 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (800) Oct 11 08:56:23 np0005481012 python3[61957]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:56:23 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (795) Oct 11 08:56:28 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (790) Oct 11 08:56:33 np0005481012 python3[61987]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:56:33 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (785) Oct 11 08:56:38 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (780) Oct 11 08:56:43 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (775) Oct 11 08:56:44 np0005481012 python3[62020]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:56:48 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (770) Oct 11 08:56:53 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (765) Oct 11 08:56:54 np0005481012 python3[62041]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:56:58 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (760) Oct 11 08:57:03 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (755) Oct 11 08:57:04 np0005481012 python3[62072]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:57:08 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (750) Oct 11 08:57:13 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (745) Oct 11 08:57:14 np0005481012 python3[62106]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:57:18 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (740) Oct 11 08:57:24 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (735) Oct 11 08:57:25 np0005481012 python3[62139]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:57:29 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (730) Oct 11 08:57:34 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (725) Oct 11 08:57:35 np0005481012 python3[62172]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:57:39 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (720) Oct 11 08:57:44 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (715) Oct 11 08:57:45 np0005481012 python3[62205]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:57:49 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (710) Oct 11 08:57:54 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (705) Oct 11 08:57:56 np0005481012 python3[62238]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:57:59 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (700) Oct 11 08:58:04 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (695) Oct 11 08:58:06 np0005481012 python3[62271]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:58:09 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (690) Oct 11 08:58:11 np0005481012 sshd[62272]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:58:14 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (685) Oct 11 08:58:16 np0005481012 python3[62308]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:58:19 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (680) Oct 11 08:58:23 np0005481012 sshd[62311]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:58:24 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (675) Oct 11 08:58:27 np0005481012 python3[62346]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:58:29 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (670) Oct 11 08:58:34 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (665) Oct 11 08:58:34 np0005481012 sshd[62351]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:58:37 np0005481012 python3[62381]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:58:39 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (660) Oct 11 08:58:44 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (655) Oct 11 08:58:47 np0005481012 python3[62416]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:58:49 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (650) Oct 11 08:58:54 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (645) Oct 11 08:58:58 np0005481012 python3[62449]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:58:59 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (640) Oct 11 08:59:04 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (635) Oct 11 08:59:08 np0005481012 python3[62472]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:59:09 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (630) Oct 11 08:59:14 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (625) Oct 11 08:59:18 np0005481012 python3[62501]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:59:19 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (620) Oct 11 08:59:24 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (615) Oct 11 08:59:29 np0005481012 python3[62534]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:59:29 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (610) Oct 11 08:59:34 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (605) Oct 11 08:59:39 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (600) Oct 11 08:59:39 np0005481012 python3[62568]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:59:44 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (595) Oct 11 08:59:49 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (590) Oct 11 08:59:49 np0005481012 python3[62601]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 08:59:54 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (585) Oct 11 08:59:59 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (580) Oct 11 08:59:59 np0005481012 python3[62634]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:00:04 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (575) Oct 11 09:00:09 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (570) Oct 11 09:00:10 np0005481012 python3[62667]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:00:14 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (565) Oct 11 09:00:19 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (560) Oct 11 09:00:20 np0005481012 python3[62700]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:00:24 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (555) Oct 11 09:00:29 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (550) Oct 11 09:00:30 np0005481012 python3[62733]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:00:34 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (545) Oct 11 09:00:39 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (540) Oct 11 09:00:41 np0005481012 python3[62766]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:00:44 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (535) Oct 11 09:00:49 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (530) Oct 11 09:00:51 np0005481012 python3[62796]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:00:54 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (525) Oct 11 09:00:59 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (520) Oct 11 09:01:01 np0005481012 python3[62829]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:01:04 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (515) Oct 11 09:01:09 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (510) Oct 11 09:01:11 np0005481012 python3[62873]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:01:14 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (505) Oct 11 09:01:19 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (500) Oct 11 09:01:22 np0005481012 python3[62894]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:01:24 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (495) Oct 11 09:01:29 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (490) Oct 11 09:01:32 np0005481012 python3[62925]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:01:34 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (485) Oct 11 09:01:39 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (480) Oct 11 09:01:42 np0005481012 python3[62958]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:01:44 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (475) Oct 11 09:01:49 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (470) Oct 11 09:01:53 np0005481012 python3[62992]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:01:54 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (465) Oct 11 09:01:59 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (460) Oct 11 09:02:03 np0005481012 python3[63025]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:02:04 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (455) Oct 11 09:02:09 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (450) Oct 11 09:02:13 np0005481012 python3[63058]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:02:14 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (445) Oct 11 09:02:19 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (440) Oct 11 09:02:24 np0005481012 python3[63091]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:02:24 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (435) Oct 11 09:02:29 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (430) Oct 11 09:02:34 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (425) Oct 11 09:02:34 np0005481012 python3[63124]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:02:39 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (420) Oct 11 09:02:44 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (415) Oct 11 09:02:44 np0005481012 python3[63159]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:02:49 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (410) Oct 11 09:02:54 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (405) Oct 11 09:02:54 np0005481012 python3[63192]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:02:59 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (400) Oct 11 09:03:04 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (395) Oct 11 09:03:05 np0005481012 python3[63222]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:03:09 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (390) Oct 11 09:03:14 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (385) Oct 11 09:03:15 np0005481012 python3[63255]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:03:19 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (380) Oct 11 09:03:24 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (375) Oct 11 09:03:25 np0005481012 python3[63288]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:03:29 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (370) Oct 11 09:03:34 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (365) Oct 11 09:03:36 np0005481012 python3[63309]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:03:39 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (360) Oct 11 09:03:44 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (355) Oct 11 09:03:46 np0005481012 python3[63340]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:03:49 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (350) Oct 11 09:03:54 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (345) Oct 11 09:03:56 np0005481012 python3[63373]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:03:59 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (340) Oct 11 09:04:04 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (335) Oct 11 09:04:07 np0005481012 python3[63406]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:04:09 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (330) Oct 11 09:04:14 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (325) Oct 11 09:04:17 np0005481012 python3[63439]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:04:19 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (320) Oct 11 09:04:24 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (315) Oct 11 09:04:27 np0005481012 python3[63472]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:04:29 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (310) Oct 11 09:04:34 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (305) Oct 11 09:04:37 np0005481012 python3[63505]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:04:39 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (300) Oct 11 09:04:44 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (295) Oct 11 09:04:48 np0005481012 python3[63538]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:04:49 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (290) Oct 11 09:04:54 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (285) Oct 11 09:04:58 np0005481012 python3[63571]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:04:59 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (280) Oct 11 09:05:04 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (275) Oct 11 09:05:08 np0005481012 python3[63604]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:05:09 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (270) Oct 11 09:05:14 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (265) Oct 11 09:05:19 np0005481012 python3[63634]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:05:19 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (260) Oct 11 09:05:24 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (255) Oct 11 09:05:29 np0005481012 python3[63667]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:05:29 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (250) Oct 11 09:05:34 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (245) Oct 11 09:05:39 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (240) Oct 11 09:05:39 np0005481012 python3[63700]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:05:44 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (235) Oct 11 09:05:49 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (230) Oct 11 09:05:50 np0005481012 python3[63722]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:05:54 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (225) Oct 11 09:05:59 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (220) Oct 11 09:06:00 np0005481012 python3[63752]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:06:04 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (215) Oct 11 09:06:09 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (210) Oct 11 09:06:10 np0005481012 python3[63785]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:06:14 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (205) Oct 11 09:06:19 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (200) Oct 11 09:06:20 np0005481012 python3[63818]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:06:24 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (195) Oct 11 09:06:29 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (190) Oct 11 09:06:31 np0005481012 python3[63851]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:06:34 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (185) Oct 11 09:06:39 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (180) Oct 11 09:06:41 np0005481012 python3[63884]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:06:44 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (175) Oct 11 09:06:49 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (170) Oct 11 09:06:51 np0005481012 python3[63917]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:06:54 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (165) Oct 11 09:06:59 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (160) Oct 11 09:07:02 np0005481012 python3[63950]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:07:04 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (155) Oct 11 09:07:09 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (150) Oct 11 09:07:12 np0005481012 python3[63983]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:07:14 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (145) Oct 11 09:07:19 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (140) Oct 11 09:07:22 np0005481012 python3[64016]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:07:24 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (135) Oct 11 09:07:27 np0005481012 sshd[64017]: main: sshd: ssh-rsa algorithm is disabled Oct 11 09:07:29 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (130) Oct 11 09:07:33 np0005481012 python3[64050]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:07:34 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (125) Oct 11 09:07:38 np0005481012 sshd[64055]: main: sshd: ssh-rsa algorithm is disabled Oct 11 09:07:39 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (120) Oct 11 09:07:43 np0005481012 python3[64088]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:07:44 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (115) Oct 11 09:07:49 np0005481012 sshd[64093]: main: sshd: ssh-rsa algorithm is disabled Oct 11 09:07:49 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (110) Oct 11 09:07:53 np0005481012 python3[64125]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:07:54 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (105) Oct 11 09:07:59 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (100) Oct 11 09:08:03 np0005481012 python3[64150]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:08:04 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (95) Oct 11 09:08:09 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (90) Oct 11 09:08:14 np0005481012 python3[64180]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:08:14 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (85) Oct 11 09:08:19 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (80) Oct 11 09:08:24 np0005481012 python3[64213]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:08:24 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (75) Oct 11 09:08:29 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (70) Oct 11 09:08:34 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (65) Oct 11 09:08:34 np0005481012 python3[64246]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:08:39 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (60) Oct 11 09:08:44 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (55) Oct 11 09:08:45 np0005481012 python3[64279]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:08:49 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (50) Oct 11 09:08:54 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (45) Oct 11 09:08:55 np0005481012 python3[64312]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:08:59 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (40) Oct 11 09:09:04 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (35) Oct 11 09:09:05 np0005481012 python3[64345]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:09:09 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (30) Oct 11 09:09:14 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (25) Oct 11 09:09:16 np0005481012 python3[64378]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:09:19 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (20) Oct 11 09:09:24 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (15) Oct 11 09:09:26 np0005481012 python3[64412]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:09:29 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (10) Oct 11 09:09:34 np0005481012 ansible-async_wrapper.py[50725]: 50726 still running (5) Oct 11 09:09:36 np0005481012 python3[64445]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:09:39 np0005481012 ansible-async_wrapper.py[50725]: Timeout reached, now killing 50726 Oct 11 09:09:39 np0005481012 ansible-async_wrapper.py[50725]: Sent kill to group 50726 Oct 11 09:09:47 np0005481012 python3[64461]: ansible-ansible.legacy.async_status Invoked with jid=276038612520.50722 mode=status _async_dir=/tmp/.ansible_async Oct 11 09:09:47 np0005481012 python3[64477]: ansible-file Invoked with path=/var/lib/container-puppet/puppetlabs state=directory setype=svirt_sandbox_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Oct 11 09:09:48 np0005481012 python3[64493]: ansible-stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 09:09:48 np0005481012 python3[64541]: ansible-ansible.legacy.stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 09:09:49 np0005481012 python3[64584]: ansible-ansible.legacy.copy Invoked with dest=/var/lib/container-puppet/puppetlabs/facter.conf setype=svirt_sandbox_file_t selevel=s0 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760173788.2802708-175598-278989796634122/source _original_basename=tmpgevbb2uh follow=False checksum=53908622cb869db5e2e2a68e737aa2ab1a872111 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None attributes=None Oct 11 09:09:49 np0005481012 python3[64614]: ansible-file Invoked with path=/opt/puppetlabs/facter state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 09:09:50 np0005481012 python3[64718]: ansible-ansible.posix.synchronize Invoked with src=/opt/puppetlabs/ dest=/var/lib/container-puppet/puppetlabs/ _local_rsync_path=rsync _local_rsync_password=NOT_LOGGING_PARAMETER rsync_path=None delete=False _substitute_controller=False archive=True checksum=False compress=True existing_only=False dirs=False copy_links=False set_remote_user=True rsync_timeout=0 rsync_opts=[] ssh_connection_multiplexing=False partial=False verify_host=False mode=push dest_port=None private_key=None recursive=None links=None perms=None times=None owner=None group=None ssh_args=None link_dest=None Oct 11 09:09:51 np0005481012 python3[64737]: ansible-file Invoked with path=/var/lib/tripleo-config/container-puppet-config mode=448 recurse=True setype=container_file_t force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False state=None _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 09:09:51 np0005481012 python3[64753]: ansible-container_puppet_config Invoked with check_mode=False config_vol_prefix=/var/lib/config-data debug=True net_host=True no_archive=False puppet_config=/var/lib/container-puppet/container-puppet.json short_hostname=np0005481012 step=1 update_config_hash_only=False Oct 11 09:09:52 np0005481012 python3[64769]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 09:09:52 np0005481012 python3[64785]: ansible-container_config_data Invoked with config_path=/var/lib/tripleo-config/container-puppet-config/step_1 config_pattern=container-puppet-*.json config_overrides={} debug=True Oct 11 09:09:52 np0005481012 systemd-journald[617]: Field hash table of /run/log/journal/0d75598033f175d0e781a840bff83569/system.journal has a fill level at 75.4 (251 of 333 items), suggesting rotation. Oct 11 09:09:52 np0005481012 systemd-journald[617]: /run/log/journal/0d75598033f175d0e781a840bff83569/system.journal: Journal header limits reached or header out-of-date, rotating. Oct 11 09:09:52 np0005481012 rsyslogd[50531]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 09:09:52 np0005481012 rsyslogd[50531]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 09:09:53 np0005481012 python3[64802]: ansible-containers.podman.podman_container_info Invoked with executable=podman name=None Oct 11 09:09:53 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 09:09:53 np0005481012 python3[64830]: ansible-tripleo_container_manage Invoked with config_id=tripleo_puppet_step1 config_dir=/var/lib/tripleo-config/container-puppet-config/step_1 config_patterns=container-puppet-*.json config_overrides={} concurrency=6 log_base_path=/var/log/containers/stdouts debug=False Oct 11 09:09:53 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 09:09:54 np0005481012 podman[64999]: 2025-10-11 09:09:54.206886864 +0000 UTC m=+0.105145704 container create bd6cb15c667fc5dc66bbbedca17e45a1ce606b57ad2af429bad46fcdf31b5322 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, managed_by=tripleo_ansible, batch=17.1_20250721.1, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, vcs-ref=9ec4c911b0dceec2244c71f081a5b32931afa57b, version=17.1.9, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-cinder-api/images/17.1.9-1, io.openshift.expose-services=, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, release=1, summary=Red Hat OpenStack Platform 17.1 cinder-api, container_name=container-puppet-cinder, distribution-scope=public, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 cinder-api, io.buildah.version=1.33.12, vendor=Red Hat, Inc., vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, build-date=2025-07-21T15:58:55, com.redhat.license_terms=https://www.redhat.com/agreements, com.redhat.component=openstack-cinder-api-container, name=rhosp17/openstack-cinder-api) Oct 11 09:09:54 np0005481012 podman[65026]: 2025-10-11 09:09:54.230274547 +0000 UTC m=+0.100761918 container create 4f6a1d3a0242a2dd3f3e16fb05e5aec18eaa460ed373f80196098ca77265bca0 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, tcib_managed=true, version=17.1.9, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 glance-api, release=1, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, build-date=2025-07-21T13:58:20, summary=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, architecture=x86_64, name=rhosp17/openstack-glance-api, io.openshift.expose-services=, io.buildah.version=1.33.12, distribution-scope=public, batch=17.1_20250721.1, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1, com.redhat.component=openstack-glance-api-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-glance-api/images/17.1.9-1, com.redhat.license_terms=https://www.redhat.com/agreements, container_name=container-puppet-glance_api, vcs-ref=2f84cc38566abd7704c6fde71a06783a20987075) Oct 11 09:09:54 np0005481012 systemd[1]: Created slice Slice /machine. Oct 11 09:09:54 np0005481012 podman[65028]: 2025-10-11 09:09:54.24945156 +0000 UTC m=+0.113748369 container create 3ac3b413ed492397d0430a6f7e17e345299200757dbb8438a295bd5c86eee7b3 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-ceilometer-central/images/17.1.9-1, tcib_managed=true, container_name=container-puppet-ceilometer, architecture=x86_64, name=rhosp17/openstack-ceilometer-central, release=1, version=17.1.9, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-ref=1ce3db7211bdafb9cc5e59a103488bd6a8dc3f2f, vcs-type=git, com.redhat.component=openstack-ceilometer-central-container, batch=17.1_20250721.1, io.openshift.expose-services=, vendor=Red Hat, Inc., distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, io.buildah.version=1.33.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 ceilometer-central, build-date=2025-07-21T14:49:23) Oct 11 09:09:54 np0005481012 podman[64999]: 2025-10-11 09:09:54.150727167 +0000 UTC m=+0.048986007 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Oct 11 09:09:54 np0005481012 systemd[1]: Started libpod-conmon-bd6cb15c667fc5dc66bbbedca17e45a1ce606b57ad2af429bad46fcdf31b5322.scope. Oct 11 09:09:54 np0005481012 systemd[1]: Started libpod-conmon-4f6a1d3a0242a2dd3f3e16fb05e5aec18eaa460ed373f80196098ca77265bca0.scope. Oct 11 09:09:54 np0005481012 podman[65048]: 2025-10-11 09:09:54.258886392 +0000 UTC m=+0.107011451 container create 400772ffa2b37bce0e5dc030d91a425ab369571bdbfe908771c773f5ef6cf332 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, release=1, io.buildah.version=1.33.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20250721.1, build-date=2025-07-21T13:58:20, io.openshift.expose-services=, config_id=tripleo_puppet_step1, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 glance-api, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-glance-api/images/17.1.9-1, io.openshift.tags=rhosp osp openstack osp-17.1, container_name=container-puppet-glance_api_internal, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=2f84cc38566abd7704c6fde71a06783a20987075, maintainer=OpenStack TripleO Team, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/agreements, com.redhat.component=openstack-glance-api-container, name=rhosp17/openstack-glance-api, architecture=x86_64, version=17.1.9, vendor=Red Hat, Inc.) Oct 11 09:09:54 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:09:54 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:09:54 np0005481012 podman[65027]: 2025-10-11 09:09:54.266615451 +0000 UTC m=+0.137360570 container create 2be9da9a05f8bbd163600d605d3e8b3733dffbdc223571a20282feb2b9badf91 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1, io.buildah.version=1.33.12, config_id=tripleo_puppet_step1, vcs-type=git, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, build-date=2025-07-21T13:04:03, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, version=17.1.9, description=Red Hat OpenStack Platform 17.1 collectd, summary=Red Hat OpenStack Platform 17.1 collectd, container_name=container-puppet-collectd, batch=17.1_20250721.1, io.openshift.expose-services=, release=2, vcs-ref=1c67cc222531545f43af554407dce9103c5ddf0b, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-collectd/images/17.1.9-2, vendor=Red Hat, Inc., name=rhosp17/openstack-collectd, com.redhat.license_terms=https://www.redhat.com/agreements, com.redhat.component=openstack-collectd-container, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, maintainer=OpenStack TripleO Team) Oct 11 09:09:54 np0005481012 podman[65027]: 2025-10-11 09:09:54.168852467 +0000 UTC m=+0.039597576 image pull registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Oct 11 09:09:54 np0005481012 podman[65026]: 2025-10-11 09:09:54.165751951 +0000 UTC m=+0.036239322 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Oct 11 09:09:54 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/ddfb1f44a5e20b78f738c500d7bf4e1988bd423b8c57331b52596bb47f66a4fb/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:09:54 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e77af82761360c7748caa3b2b9eaf66710fe25ca354efc1eec1ceb95a78f30b5/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:09:54 np0005481012 podman[65028]: 2025-10-11 09:09:54.175895175 +0000 UTC m=+0.040192014 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Oct 11 09:09:54 np0005481012 podman[65048]: 2025-10-11 09:09:54.193472029 +0000 UTC m=+0.041597108 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Oct 11 09:09:54 np0005481012 podman[65026]: 2025-10-11 09:09:54.296361472 +0000 UTC m=+0.166848843 container init 4f6a1d3a0242a2dd3f3e16fb05e5aec18eaa460ed373f80196098ca77265bca0 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.9, batch=17.1_20250721.1, description=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=2f84cc38566abd7704c6fde71a06783a20987075, maintainer=OpenStack TripleO Team, build-date=2025-07-21T13:58:20, container_name=container-puppet-glance_api, distribution-scope=public, vcs-type=git, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1, release=1, com.redhat.component=openstack-glance-api-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.33.12, tcib_managed=true, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-glance-api/images/17.1.9-1, com.redhat.license_terms=https://www.redhat.com/agreements, architecture=x86_64, name=rhosp17/openstack-glance-api, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api) Oct 11 09:09:54 np0005481012 systemd[1]: Started libpod-conmon-3ac3b413ed492397d0430a6f7e17e345299200757dbb8438a295bd5c86eee7b3.scope. Oct 11 09:09:54 np0005481012 systemd[1]: Started libpod-conmon-400772ffa2b37bce0e5dc030d91a425ab369571bdbfe908771c773f5ef6cf332.scope. Oct 11 09:09:54 np0005481012 podman[65026]: 2025-10-11 09:09:54.306321899 +0000 UTC m=+0.176809280 container start 4f6a1d3a0242a2dd3f3e16fb05e5aec18eaa460ed373f80196098ca77265bca0 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, io.openshift.tags=rhosp osp openstack osp-17.1, build-date=2025-07-21T13:58:20, com.redhat.component=openstack-glance-api-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-glance_api, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, vcs-ref=2f84cc38566abd7704c6fde71a06783a20987075, release=1, summary=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.33.12, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-glance-api/images/17.1.9-1, com.redhat.license_terms=https://www.redhat.com/agreements, vendor=Red Hat, Inc., name=rhosp17/openstack-glance-api, version=17.1.9, architecture=x86_64, batch=17.1_20250721.1, config_id=tripleo_puppet_step1, vcs-type=git, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, description=Red Hat OpenStack Platform 17.1 glance-api) Oct 11 09:09:54 np0005481012 podman[65026]: 2025-10-11 09:09:54.306590157 +0000 UTC m=+0.177077528 container attach 4f6a1d3a0242a2dd3f3e16fb05e5aec18eaa460ed373f80196098ca77265bca0 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, io.buildah.version=1.33.12, summary=Red Hat OpenStack Platform 17.1 glance-api, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1, name=rhosp17/openstack-glance-api, com.redhat.component=openstack-glance-api-container, version=17.1.9, maintainer=OpenStack TripleO Team, vcs-ref=2f84cc38566abd7704c6fde71a06783a20987075, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20250721.1, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/agreements, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., release=1, tcib_managed=true, architecture=x86_64, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-glance-api/images/17.1.9-1, container_name=container-puppet-glance_api, description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.expose-services=, vcs-type=git, build-date=2025-07-21T13:58:20, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Oct 11 09:09:54 np0005481012 systemd[1]: Started libpod-conmon-2be9da9a05f8bbd163600d605d3e8b3733dffbdc223571a20282feb2b9badf91.scope. Oct 11 09:09:54 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:09:54 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:09:54 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:09:54 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/8af323a6bd6cb1a6accb0643601d9aa60a3521a33628aed6747c06f20d3c950a/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:09:54 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/118449cb5154ecb98708e22a11e0fbe450b0f5032f1f83061853ae4b87d8fb9d/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:09:54 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/9f9cb75e37ebe8c96e7367b0f7ac451a63b654349e101c219aa3a95719c192ee/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:09:54 np0005481012 podman[65048]: 2025-10-11 09:09:54.324930615 +0000 UTC m=+0.173055674 container init 400772ffa2b37bce0e5dc030d91a425ab369571bdbfe908771c773f5ef6cf332 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, config_id=tripleo_puppet_step1, tcib_managed=true, container_name=container-puppet-glance_api_internal, batch=17.1_20250721.1, vendor=Red Hat, Inc., vcs-ref=2f84cc38566abd7704c6fde71a06783a20987075, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/agreements, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-glance-api/images/17.1.9-1, io.openshift.tags=rhosp osp openstack osp-17.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, io.openshift.expose-services=, distribution-scope=public, com.redhat.component=openstack-glance-api-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp17/openstack-glance-api, managed_by=tripleo_ansible, build-date=2025-07-21T13:58:20, description=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.9, io.buildah.version=1.33.12, maintainer=OpenStack TripleO Team, release=1, summary=Red Hat OpenStack Platform 17.1 glance-api) Oct 11 09:09:54 np0005481012 podman[65027]: 2025-10-11 09:09:54.326719711 +0000 UTC m=+0.197464820 container init 2be9da9a05f8bbd163600d605d3e8b3733dffbdc223571a20282feb2b9badf91 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, com.redhat.license_terms=https://www.redhat.com/agreements, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, version=17.1.9, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 collectd, vcs-ref=1c67cc222531545f43af554407dce9103c5ddf0b, com.redhat.component=openstack-collectd-container, build-date=2025-07-21T13:04:03, architecture=x86_64, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1, summary=Red Hat OpenStack Platform 17.1 collectd, name=rhosp17/openstack-collectd, vendor=Red Hat, Inc., batch=17.1_20250721.1, io.openshift.expose-services=, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, release=2, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-collectd/images/17.1.9-2, distribution-scope=public, container_name=container-puppet-collectd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.33.12, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1) Oct 11 09:09:54 np0005481012 podman[65048]: 2025-10-11 09:09:54.330654192 +0000 UTC m=+0.178779251 container start 400772ffa2b37bce0e5dc030d91a425ab369571bdbfe908771c773f5ef6cf332 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, io.openshift.expose-services=, vendor=Red Hat, Inc., url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-glance-api/images/17.1.9-1, container_name=container-puppet-glance_api_internal, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/agreements, io.buildah.version=1.33.12, com.redhat.component=openstack-glance-api-container, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.9, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, name=rhosp17/openstack-glance-api, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20250721.1, build-date=2025-07-21T13:58:20, vcs-ref=2f84cc38566abd7704c6fde71a06783a20987075, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, release=1, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1) Oct 11 09:09:54 np0005481012 podman[65048]: 2025-10-11 09:09:54.331101306 +0000 UTC m=+0.179226365 container attach 400772ffa2b37bce0e5dc030d91a425ab369571bdbfe908771c773f5ef6cf332 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, io.openshift.expose-services=, architecture=x86_64, release=1, vcs-ref=2f84cc38566abd7704c6fde71a06783a20987075, name=rhosp17/openstack-glance-api, version=17.1.9, build-date=2025-07-21T13:58:20, config_id=tripleo_puppet_step1, tcib_managed=true, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, io.buildah.version=1.33.12, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20250721.1, summary=Red Hat OpenStack Platform 17.1 glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/agreements, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-glance-api/images/17.1.9-1, vcs-type=git, container_name=container-puppet-glance_api_internal, io.openshift.tags=rhosp osp openstack osp-17.1) Oct 11 09:09:54 np0005481012 podman[65027]: 2025-10-11 09:09:54.343532861 +0000 UTC m=+0.214277960 container start 2be9da9a05f8bbd163600d605d3e8b3733dffbdc223571a20282feb2b9badf91 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, release=2, vcs-ref=1c67cc222531545f43af554407dce9103c5ddf0b, batch=17.1_20250721.1, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, com.redhat.license_terms=https://www.redhat.com/agreements, version=17.1.9, managed_by=tripleo_ansible, tcib_managed=true, maintainer=OpenStack TripleO Team, vcs-type=git, com.redhat.component=openstack-collectd-container, io.buildah.version=1.33.12, config_id=tripleo_puppet_step1, distribution-scope=public, name=rhosp17/openstack-collectd, vendor=Red Hat, Inc., build-date=2025-07-21T13:04:03, io.openshift.tags=rhosp osp openstack osp-17.1, description=Red Hat OpenStack Platform 17.1 collectd, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-collectd/images/17.1.9-2, container_name=container-puppet-collectd, io.openshift.expose-services=) Oct 11 09:09:54 np0005481012 podman[65027]: 2025-10-11 09:09:54.343771768 +0000 UTC m=+0.214517047 container attach 2be9da9a05f8bbd163600d605d3e8b3733dffbdc223571a20282feb2b9badf91 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, release=2, vcs-type=git, description=Red Hat OpenStack Platform 17.1 collectd, distribution-scope=public, name=rhosp17/openstack-collectd, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, summary=Red Hat OpenStack Platform 17.1 collectd, batch=17.1_20250721.1, io.buildah.version=1.33.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true, vendor=Red Hat, Inc., vcs-ref=1c67cc222531545f43af554407dce9103c5ddf0b, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-collectd/images/17.1.9-2, build-date=2025-07-21T13:04:03, architecture=x86_64, container_name=container-puppet-collectd, com.redhat.license_terms=https://www.redhat.com/agreements, version=17.1.9, com.redhat.component=openstack-collectd-container, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1) Oct 11 09:09:54 np0005481012 podman[64999]: 2025-10-11 09:09:54.353108417 +0000 UTC m=+0.251367257 container init bd6cb15c667fc5dc66bbbedca17e45a1ce606b57ad2af429bad46fcdf31b5322 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.tags=rhosp osp openstack osp-17.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, distribution-scope=public, batch=17.1_20250721.1, build-date=2025-07-21T15:58:55, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 cinder-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-cinder-api, vcs-ref=9ec4c911b0dceec2244c71f081a5b32931afa57b, tcib_managed=true, com.redhat.component=openstack-cinder-api-container, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, io.openshift.expose-services=, io.buildah.version=1.33.12, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-type=git, container_name=container-puppet-cinder, version=17.1.9, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-cinder-api/images/17.1.9-1, release=1) Oct 11 09:09:54 np0005481012 podman[64999]: 2025-10-11 09:09:54.357923556 +0000 UTC m=+0.256182396 container start bd6cb15c667fc5dc66bbbedca17e45a1ce606b57ad2af429bad46fcdf31b5322 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, version=17.1.9, vendor=Red Hat, Inc., com.redhat.component=openstack-cinder-api-container, batch=17.1_20250721.1, maintainer=OpenStack TripleO Team, vcs-ref=9ec4c911b0dceec2244c71f081a5b32931afa57b, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 cinder-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1, name=rhosp17/openstack-cinder-api, com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.tags=rhosp osp openstack osp-17.1, container_name=container-puppet-cinder, io.buildah.version=1.33.12, io.openshift.expose-services=, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, vcs-type=git, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-cinder-api/images/17.1.9-1, architecture=x86_64, build-date=2025-07-21T15:58:55, summary=Red Hat OpenStack Platform 17.1 cinder-api, tcib_managed=true) Oct 11 09:09:54 np0005481012 podman[64999]: 2025-10-11 09:09:54.35806899 +0000 UTC m=+0.256327850 container attach bd6cb15c667fc5dc66bbbedca17e45a1ce606b57ad2af429bad46fcdf31b5322 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, version=17.1.9, release=1, build-date=2025-07-21T15:58:55, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, batch=17.1_20250721.1, com.redhat.license_terms=https://www.redhat.com/agreements, summary=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.tags=rhosp osp openstack osp-17.1, container_name=container-puppet-cinder, com.redhat.component=openstack-cinder-api-container, vendor=Red Hat, Inc., url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-cinder-api/images/17.1.9-1, architecture=x86_64, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 cinder-api, io.buildah.version=1.33.12, managed_by=tripleo_ansible, vcs-ref=9ec4c911b0dceec2244c71f081a5b32931afa57b, vcs-type=git, name=rhosp17/openstack-cinder-api) Oct 11 09:09:54 np0005481012 podman[65028]: 2025-10-11 09:09:54.37943596 +0000 UTC m=+0.243732769 container init 3ac3b413ed492397d0430a6f7e17e345299200757dbb8438a295bd5c86eee7b3 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, release=1, vcs-ref=1ce3db7211bdafb9cc5e59a103488bd6a8dc3f2f, build-date=2025-07-21T14:49:23, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, config_id=tripleo_puppet_step1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-ceilometer-central/images/17.1.9-1, version=17.1.9, description=Red Hat OpenStack Platform 17.1 ceilometer-central, vendor=Red Hat, Inc., name=rhosp17/openstack-ceilometer-central, container_name=container-puppet-ceilometer, io.openshift.tags=rhosp osp openstack osp-17.1, com.redhat.license_terms=https://www.redhat.com/agreements, com.redhat.component=openstack-ceilometer-central-container, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.buildah.version=1.33.12, vcs-type=git, architecture=x86_64, batch=17.1_20250721.1, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, tcib_managed=true) Oct 11 09:09:54 np0005481012 podman[65028]: 2025-10-11 09:09:54.389351658 +0000 UTC m=+0.253648457 container start 3ac3b413ed492397d0430a6f7e17e345299200757dbb8438a295bd5c86eee7b3 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, io.buildah.version=1.33.12, maintainer=OpenStack TripleO Team, distribution-scope=public, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, vcs-type=git, version=17.1.9, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-ceilometer-central/images/17.1.9-1, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, name=rhosp17/openstack-ceilometer-central, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, container_name=container-puppet-ceilometer, config_id=tripleo_puppet_step1, io.openshift.expose-services=, vcs-ref=1ce3db7211bdafb9cc5e59a103488bd6a8dc3f2f, build-date=2025-07-21T14:49:23, vendor=Red Hat, Inc., batch=17.1_20250721.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1, com.redhat.component=openstack-ceilometer-central-container, release=1, com.redhat.license_terms=https://www.redhat.com/agreements, tcib_managed=true) Oct 11 09:09:54 np0005481012 podman[65028]: 2025-10-11 09:09:54.390584215 +0000 UTC m=+0.254881034 container attach 3ac3b413ed492397d0430a6f7e17e345299200757dbb8438a295bd5c86eee7b3 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, distribution-scope=public, container_name=container-puppet-ceilometer, release=1, version=17.1.9, vcs-ref=1ce3db7211bdafb9cc5e59a103488bd6a8dc3f2f, vendor=Red Hat, Inc., config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, batch=17.1_20250721.1, name=rhosp17/openstack-ceilometer-central, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1, com.redhat.component=openstack-ceilometer-central-container, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-ceilometer-central/images/17.1.9-1, description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.buildah.version=1.33.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, com.redhat.license_terms=https://www.redhat.com/agreements, tcib_managed=true, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, build-date=2025-07-21T14:49:23, config_id=tripleo_puppet_step1, io.openshift.expose-services=) Oct 11 09:09:54 np0005481012 podman[65069]: 2025-10-11 09:09:54.309484717 +0000 UTC m=+0.142665304 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Oct 11 09:09:54 np0005481012 podman[65069]: 2025-10-11 09:09:54.438728975 +0000 UTC m=+0.271909552 container create 74db54366355099473d508e5246984caf183e55c1f2bcabf7242c1ec5b0df89b (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-mariadb, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, com.redhat.component=openstack-mariadb-container, summary=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, tcib_managed=true, distribution-scope=public, release=1, managed_by=tripleo_ansible, batch=17.1_20250721.1, version=17.1.9, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.33.12, container_name=container-puppet-clustercheck, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 mariadb, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, build-date=2025-07-21T12:58:45) Oct 11 09:09:54 np0005481012 systemd[1]: Started libpod-conmon-74db54366355099473d508e5246984caf183e55c1f2bcabf7242c1ec5b0df89b.scope. Oct 11 09:09:54 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:09:54 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5c46cde8c456d6b4618adb65b532083fe32865dfe5cbfc23e36bc8c6a2770225/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:09:54 np0005481012 podman[65069]: 2025-10-11 09:09:54.490685702 +0000 UTC m=+0.323866289 container init 74db54366355099473d508e5246984caf183e55c1f2bcabf7242c1ec5b0df89b (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.9, summary=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, build-date=2025-07-21T12:58:45, io.openshift.tags=rhosp osp openstack osp-17.1, io.buildah.version=1.33.12, container_name=container-puppet-clustercheck, release=1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/agreements, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, com.redhat.component=openstack-mariadb-container, description=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, vendor=Red Hat, Inc., batch=17.1_20250721.1, name=rhosp17/openstack-mariadb, config_id=tripleo_puppet_step1, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, vcs-type=git, architecture=x86_64, tcib_managed=true) Oct 11 09:09:54 np0005481012 podman[65069]: 2025-10-11 09:09:54.500457815 +0000 UTC m=+0.333638392 container start 74db54366355099473d508e5246984caf183e55c1f2bcabf7242c1ec5b0df89b (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, description=Red Hat OpenStack Platform 17.1 mariadb, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, version=17.1.9, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-mariadb, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1, io.buildah.version=1.33.12, architecture=x86_64, managed_by=tripleo_ansible, release=1, build-date=2025-07-21T12:58:45, com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20250721.1, summary=Red Hat OpenStack Platform 17.1 mariadb, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, com.redhat.component=openstack-mariadb-container, vendor=Red Hat, Inc., distribution-scope=public, container_name=container-puppet-clustercheck, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172) Oct 11 09:09:54 np0005481012 podman[65069]: 2025-10-11 09:09:54.500599619 +0000 UTC m=+0.333780236 container attach 74db54366355099473d508e5246984caf183e55c1f2bcabf7242c1ec5b0df89b (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, com.redhat.license_terms=https://www.redhat.com/agreements, container_name=container-puppet-clustercheck, description=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, release=1, name=rhosp17/openstack-mariadb, build-date=2025-07-21T12:58:45, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, vendor=Red Hat, Inc., batch=17.1_20250721.1, version=17.1.9, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, vcs-type=git, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, io.buildah.version=1.33.12, architecture=x86_64, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1) Oct 11 09:09:56 np0005481012 puppet-user[65171]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:09:56 np0005481012 puppet-user[65171]: (file: /etc/puppet/hiera.yaml) Oct 11 09:09:56 np0005481012 puppet-user[65171]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:09:56 np0005481012 puppet-user[65171]: (file & line not available) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:09:56 np0005481012 puppet-user[65196]: (file: /etc/puppet/hiera.yaml) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:09:56 np0005481012 puppet-user[65196]: (file & line not available) Oct 11 09:09:56 np0005481012 puppet-user[65171]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:09:56 np0005481012 puppet-user[65171]: (file & line not available) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:09:56 np0005481012 puppet-user[65196]: (file & line not available) Oct 11 09:09:56 np0005481012 puppet-user[65184]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:09:56 np0005481012 puppet-user[65184]: (file: /etc/puppet/hiera.yaml) Oct 11 09:09:56 np0005481012 puppet-user[65184]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:09:56 np0005481012 puppet-user[65184]: (file & line not available) Oct 11 09:09:56 np0005481012 puppet-user[65168]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:09:56 np0005481012 puppet-user[65168]: (file: /etc/puppet/hiera.yaml) Oct 11 09:09:56 np0005481012 puppet-user[65168]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:09:56 np0005481012 puppet-user[65168]: (file & line not available) Oct 11 09:09:56 np0005481012 puppet-user[65184]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:09:56 np0005481012 puppet-user[65184]: (file & line not available) Oct 11 09:09:56 np0005481012 puppet-user[65184]: Warning: Scope(Class[Tripleo::Profile::Base::Cinder::Api]): The keymgr_backend parameter has been deprecated and has no effect. Oct 11 09:09:56 np0005481012 puppet-user[65168]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:09:56 np0005481012 puppet-user[65168]: (file & line not available) Oct 11 09:09:56 np0005481012 puppet-user[65165]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:09:56 np0005481012 puppet-user[65165]: (file: /etc/puppet/hiera.yaml) Oct 11 09:09:56 np0005481012 puppet-user[65165]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:09:56 np0005481012 puppet-user[65165]: (file & line not available) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: Unknown variable: '::ceilometer::cache_backend'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 145, column: 39) Oct 11 09:09:56 np0005481012 puppet-user[65165]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:09:56 np0005481012 puppet-user[65165]: (file & line not available) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: Unknown variable: '::ceilometer::memcache_servers'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 146, column: 39) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: Unknown variable: '::ceilometer::cache_tls_enabled'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 147, column: 39) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: Unknown variable: '::ceilometer::cache_tls_cafile'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 148, column: 39) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: Unknown variable: '::ceilometer::cache_tls_certfile'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 149, column: 39) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: Unknown variable: '::ceilometer::cache_tls_keyfile'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 150, column: 39) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: Unknown variable: '::ceilometer::cache_tls_allowed_ciphers'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 151, column: 39) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: Unknown variable: '::ceilometer::manage_backend_package'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 152, column: 39) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_password'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 63, column: 25) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_url'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 68, column: 25) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_region'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 69, column: 28) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_user'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 70, column: 25) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_tenant_name'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 71, column: 29) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_cacert'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 72, column: 23) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_endpoint_type'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 73, column: 26) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_user_domain_name'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 74, column: 33) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_project_domain_name'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 75, column: 36) Oct 11 09:09:56 np0005481012 puppet-user[65196]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_type'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 76, column: 26) Oct 11 09:09:56 np0005481012 puppet-user[65184]: Warning: Scope(Class[Cinder]): The database_connection parameter is deprecated and will be \ Oct 11 09:09:56 np0005481012 puppet-user[65184]: removed in a future realse. Use cinder::db::database_connection instead Oct 11 09:09:56 np0005481012 puppet-user[65184]: Warning: Unknown variable: 'cinder::api::keymgr_backend'. (file: /etc/puppet/modules/cinder/manifests/init.pp, line: 455, column: 31) Oct 11 09:09:56 np0005481012 puppet-user[65184]: Warning: Unknown variable: 'cinder::api::keymgr_encryption_api_url'. (file: /etc/puppet/modules/cinder/manifests/init.pp, line: 456, column: 42) Oct 11 09:09:56 np0005481012 puppet-user[65184]: Warning: Unknown variable: 'cinder::api::keymgr_encryption_auth_url'. (file: /etc/puppet/modules/cinder/manifests/init.pp, line: 458, column: 43) Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 0.34 seconds Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 0.39 seconds Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/content: content changed '{sha256}aea388a73ebafc7e07a81ddb930a91099211f660eee55fbf92c13007a77501e5' to '{sha256}2523d01ee9c3022c0e9f61d896b1474a168e18472aee141cc278e69fe13f41c1' Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/owner: owner changed 'collectd' to 'root' Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/group: group changed 'collectd' to 'root' Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/mode: mode changed '0644' to '0640' Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[DEFAULT/http_timeout]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[DEFAULT/host]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[publisher/telemetry_secret]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[hardware/readonly_user_name]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[hardware/readonly_user_password]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/auth_url]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/region_name]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/username]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/password]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/project_name]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/interface]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/user_domain_name]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/project_domain_name]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/auth_type]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer::Agent::Polling/Ceilometer_config[DEFAULT/polling_namespaces]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer::Agent::Polling/Ceilometer_config[polling/tenant_name_discovery]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[collectd.d]/owner: owner changed 'collectd' to 'root' Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[collectd.d]/group: group changed 'collectd' to 'root' Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[collectd.d]/mode: mode changed '0755' to '0750' Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-cpu.conf]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-interface.conf]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-load.conf]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-memory.conf]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer::Agent::Polling/Ceilometer_config[coordination/backend_url]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-syslog.conf]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/apache.conf]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/dns.conf]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ipmi.conf]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/mcelog.conf]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/mysql.conf]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ovs-events.conf]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ovs-stats.conf]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ping.conf]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/pmu.conf]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer::Agent::Notification/File[event_pipeline]/ensure: defined content as '{sha256}97b000582d6be7fd4e80bc1fc15bc0358888fdea71d4447491d8c683cd09e21b' Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/rdt.conf]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/sensors.conf]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/snmp.conf]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/virt.conf]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/write_prometheus.conf]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Plugin::Python/File[/usr/lib/python3.9/site-packages]/mode: mode changed '0755' to '0750' Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/backend]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Plugin::Python/Collectd::Plugin[python]/File[python.load]/ensure: defined content as '{sha256}0163924a0099dd43fe39cb85e836df147fd2cfee8197dc6866d3c384539eb6ee' Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/enabled]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Plugin::Python/Concat[/etc/collectd.d/python-config.conf]/File[/etc/collectd.d/python-config.conf]/ensure: defined content as '{sha256}2e5fb20e60b30f84687fc456a37fc62451000d2d85f5bbc1b3fca3a5eac9deeb' Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/memcache_servers]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Plugin::Logfile/Collectd::Plugin[logfile]/File[logfile.load]/ensure: defined content as '{sha256}07bbda08ef9b824089500bdc6ac5a86e7d1ef2ae3ed4ed423c0559fe6361e5af' Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Plugin::Amqp1/Collectd::Plugin[amqp1]/File[amqp1.load]/ensure: defined content as '{sha256}5f4ef999e2aa74bccc3d619d9edb41fd0a9182d363770d07d1442f9f4950bb37' Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/tls_enabled]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Plugin::Cpu/Collectd::Plugin[cpu]/File[cpu.load]/ensure: defined content as '{sha256}67d4c8bf6bf5785f4cb6b596712204d9eacbcebbf16fe289907195d4d3cb0e34' Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Plugin::Df/Collectd::Plugin[df]/File[df.load]/ensure: defined content as '{sha256}edeb4716d96fc9dca2c6adfe07bae70ba08c6af3944a3900581cba0f08f3c4ba' Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Plugin::Disk/Collectd::Plugin[disk]/File[disk.load]/ensure: defined content as '{sha256}1d0cb838278f3226fcd381f0fc2e0e1abaf0d590f4ba7bcb2fc6ec113d3ebde7' Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Plugin::Hugepages/Collectd::Plugin[hugepages]/File[hugepages.load]/ensure: defined content as '{sha256}9b9f35b65a73da8d4037e4355a23b678f2cf61997ccf7a5e1adf2a7ce6415827' Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Plugin::Hugepages/Collectd::Plugin[hugepages]/File[older_hugepages.load]/ensure: removed Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Plugin::Interface/Collectd::Plugin[interface]/File[interface.load]/ensure: defined content as '{sha256}b76b315dc312e398940fe029c6dbc5c18d2b974ff7527469fc7d3617b5222046' Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Rabbit[ceilometer_config]/Ceilometer_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Plugin::Load/Collectd::Plugin[load]/File[load.load]/ensure: defined content as '{sha256}af2403f76aebd2f10202d66d2d55e1a8d987eed09ced5a3e3873a4093585dc31' Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Plugin::Memory/Collectd::Plugin[memory]/File[memory.load]/ensure: defined content as '{sha256}0f270425ee6b05fc9440ee32b9afd1010dcbddd9b04ca78ff693858f7ecb9d0e' Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Plugin::Unixsock/Collectd::Plugin[unixsock]/File[unixsock.load]/ensure: defined content as '{sha256}9d1ec1c51ba386baa6f62d2e019dbd6998ad924bf868b3edc2d24d3dc3c63885' Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Plugin::Uptime/Collectd::Plugin[uptime]/File[uptime.load]/ensure: defined content as '{sha256}f7a26c6369f904d0ca1af59627ebea15f5e72160bcacdf08d217af282b42e5c0' Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: /Stage[main]/Collectd::Plugin::Memcached/Collectd::Plugin[memcached]/File[memcached.load]/ensure: defined content as '{sha256}2d19414f7d47e6189605e281b1d510f099947f4219b22e2d001127954658b68c' Oct 11 09:09:56 np0005481012 puppet-user[65171]: Notice: Applied catalog in 0.26 seconds Oct 11 09:09:56 np0005481012 puppet-user[65171]: Application: Oct 11 09:09:56 np0005481012 puppet-user[65171]: Initial environment: production Oct 11 09:09:56 np0005481012 puppet-user[65171]: Converged environment: production Oct 11 09:09:56 np0005481012 puppet-user[65171]: Run mode: user Oct 11 09:09:56 np0005481012 puppet-user[65171]: Changes: Oct 11 09:09:56 np0005481012 puppet-user[65171]: Total: 42 Oct 11 09:09:56 np0005481012 puppet-user[65171]: Events: Oct 11 09:09:56 np0005481012 puppet-user[65171]: Success: 42 Oct 11 09:09:56 np0005481012 puppet-user[65171]: Total: 42 Oct 11 09:09:56 np0005481012 puppet-user[65171]: Resources: Oct 11 09:09:56 np0005481012 puppet-user[65171]: Skipped: 12 Oct 11 09:09:56 np0005481012 puppet-user[65171]: Changed: 37 Oct 11 09:09:56 np0005481012 puppet-user[65171]: Out of sync: 37 Oct 11 09:09:56 np0005481012 puppet-user[65171]: Total: 77 Oct 11 09:09:56 np0005481012 puppet-user[65171]: Time: Oct 11 09:09:56 np0005481012 puppet-user[65171]: Concat fragment: 0.00 Oct 11 09:09:56 np0005481012 puppet-user[65171]: Concat file: 0.00 Oct 11 09:09:56 np0005481012 puppet-user[65171]: File: 0.09 Oct 11 09:09:56 np0005481012 puppet-user[65171]: Transaction evaluation: 0.25 Oct 11 09:09:56 np0005481012 puppet-user[65171]: Catalog application: 0.26 Oct 11 09:09:56 np0005481012 puppet-user[65171]: Config retrieval: 0.41 Oct 11 09:09:56 np0005481012 puppet-user[65171]: Last run: 1760173796 Oct 11 09:09:56 np0005481012 puppet-user[65171]: Total: 0.26 Oct 11 09:09:56 np0005481012 puppet-user[65171]: Version: Oct 11 09:09:56 np0005481012 puppet-user[65171]: Config: 1760173796 Oct 11 09:09:56 np0005481012 puppet-user[65171]: Puppet: 7.10.0 Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Amqp[ceilometer_config]/Ceilometer_config[oslo_messaging_amqp/rpc_address_prefix]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Amqp[ceilometer_config]/Ceilometer_config[oslo_messaging_amqp/notify_address_prefix]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65214]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:09:56 np0005481012 puppet-user[65214]: (file: /etc/puppet/hiera.yaml) Oct 11 09:09:56 np0005481012 puppet-user[65214]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:09:56 np0005481012 puppet-user[65214]: (file & line not available) Oct 11 09:09:56 np0005481012 puppet-user[65214]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:09:56 np0005481012 puppet-user[65214]: (file & line not available) Oct 11 09:09:56 np0005481012 puppet-user[65168]: Warning: Scope(Class[Glance::Api]): glance::api::os_region_name is deprecated. Use \ Oct 11 09:09:56 np0005481012 puppet-user[65168]: glance::backend::multistore::cinder::cinder_os_region_name instead. Oct 11 09:09:56 np0005481012 puppet-user[65165]: Warning: Scope(Class[Glance::Api]): glance::api::os_region_name is deprecated. Use \ Oct 11 09:09:56 np0005481012 puppet-user[65165]: glance::backend::multistore::cinder::cinder_os_region_name instead. Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Notifications[ceilometer_config]/Ceilometer_config[oslo_messaging_notifications/driver]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Notifications[ceilometer_config]/Ceilometer_config[oslo_messaging_notifications/transport_url]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Notifications[ceilometer_config]/Ceilometer_config[oslo_messaging_notifications/topics]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65165]: Warning: Scope(Class[Glance::Api]): The show_multiple_locations parameter is deprecated, and will be removed in a future release Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Default[ceilometer_config]/Ceilometer_config[DEFAULT/transport_url]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65214]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 0.09 seconds Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer::Logging/Oslo::Log[ceilometer_config]/Ceilometer_config[DEFAULT/debug]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: /Stage[main]/Ceilometer::Logging/Oslo::Log[ceilometer_config]/Ceilometer_config[DEFAULT/log_dir]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65214]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Clustercheck/File[/etc/sysconfig/clustercheck]/ensure: defined content as '{sha256}3c97cb177081b53d41e24000250be614599666e5b0ff2682ab5b300c4a138dd9' Oct 11 09:09:56 np0005481012 puppet-user[65214]: Notice: /Stage[main]/Xinetd/File[/etc/xinetd.d]/ensure: created Oct 11 09:09:56 np0005481012 puppet-user[65214]: Notice: /Stage[main]/Xinetd/File[/etc/xinetd.conf]/ensure: defined content as '{sha256}37f48d3e5dce056a46519d144042a388bde95ea9fa161d3362eedf70e7987a91' Oct 11 09:09:56 np0005481012 puppet-user[65214]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Clustercheck/Xinetd::Service[galera-monitor]/File[/etc/xinetd.d/galera-monitor]/ensure: defined content as '{sha256}12cc149b1535ff786e74f5a3f77b63d2aab2cf3d4d0d8c22b3f2d0b949a4c84b' Oct 11 09:09:56 np0005481012 puppet-user[65214]: Notice: Applied catalog in 0.04 seconds Oct 11 09:09:56 np0005481012 puppet-user[65214]: Application: Oct 11 09:09:56 np0005481012 puppet-user[65214]: Initial environment: production Oct 11 09:09:56 np0005481012 puppet-user[65214]: Converged environment: production Oct 11 09:09:56 np0005481012 puppet-user[65214]: Run mode: user Oct 11 09:09:56 np0005481012 puppet-user[65214]: Changes: Oct 11 09:09:56 np0005481012 puppet-user[65214]: Total: 4 Oct 11 09:09:56 np0005481012 puppet-user[65214]: Events: Oct 11 09:09:56 np0005481012 puppet-user[65214]: Success: 4 Oct 11 09:09:56 np0005481012 puppet-user[65214]: Total: 4 Oct 11 09:09:56 np0005481012 puppet-user[65214]: Resources: Oct 11 09:09:56 np0005481012 puppet-user[65214]: Changed: 4 Oct 11 09:09:56 np0005481012 puppet-user[65214]: Out of sync: 4 Oct 11 09:09:56 np0005481012 puppet-user[65214]: Skipped: 9 Oct 11 09:09:56 np0005481012 puppet-user[65214]: Total: 13 Oct 11 09:09:56 np0005481012 puppet-user[65214]: Time: Oct 11 09:09:56 np0005481012 puppet-user[65214]: File: 0.02 Oct 11 09:09:56 np0005481012 puppet-user[65214]: Transaction evaluation: 0.03 Oct 11 09:09:56 np0005481012 puppet-user[65214]: Catalog application: 0.04 Oct 11 09:09:56 np0005481012 puppet-user[65214]: Config retrieval: 0.11 Oct 11 09:09:56 np0005481012 puppet-user[65214]: Last run: 1760173796 Oct 11 09:09:56 np0005481012 puppet-user[65214]: Total: 0.04 Oct 11 09:09:56 np0005481012 puppet-user[65214]: Version: Oct 11 09:09:56 np0005481012 puppet-user[65214]: Config: 1760173796 Oct 11 09:09:56 np0005481012 puppet-user[65214]: Puppet: 7.10.0 Oct 11 09:09:56 np0005481012 puppet-user[65196]: Notice: Applied catalog in 0.42 seconds Oct 11 09:09:56 np0005481012 puppet-user[65196]: Application: Oct 11 09:09:56 np0005481012 puppet-user[65196]: Initial environment: production Oct 11 09:09:56 np0005481012 puppet-user[65196]: Converged environment: production Oct 11 09:09:56 np0005481012 puppet-user[65196]: Run mode: user Oct 11 09:09:56 np0005481012 puppet-user[65196]: Changes: Oct 11 09:09:56 np0005481012 puppet-user[65196]: Total: 31 Oct 11 09:09:56 np0005481012 puppet-user[65196]: Events: Oct 11 09:09:56 np0005481012 puppet-user[65196]: Success: 31 Oct 11 09:09:56 np0005481012 puppet-user[65196]: Total: 31 Oct 11 09:09:56 np0005481012 puppet-user[65196]: Resources: Oct 11 09:09:56 np0005481012 puppet-user[65196]: Skipped: 24 Oct 11 09:09:56 np0005481012 puppet-user[65196]: Changed: 31 Oct 11 09:09:56 np0005481012 puppet-user[65196]: Out of sync: 31 Oct 11 09:09:56 np0005481012 puppet-user[65196]: Total: 157 Oct 11 09:09:56 np0005481012 puppet-user[65196]: Time: Oct 11 09:09:56 np0005481012 puppet-user[65196]: File: 0.00 Oct 11 09:09:56 np0005481012 puppet-user[65196]: Ceilometer config: 0.35 Oct 11 09:09:56 np0005481012 puppet-user[65196]: Transaction evaluation: 0.41 Oct 11 09:09:56 np0005481012 puppet-user[65196]: Catalog application: 0.42 Oct 11 09:09:56 np0005481012 puppet-user[65196]: Config retrieval: 0.46 Oct 11 09:09:56 np0005481012 puppet-user[65196]: Last run: 1760173796 Oct 11 09:09:56 np0005481012 puppet-user[65196]: Resources: 0.00 Oct 11 09:09:56 np0005481012 puppet-user[65196]: Total: 0.42 Oct 11 09:09:56 np0005481012 puppet-user[65196]: Version: Oct 11 09:09:56 np0005481012 puppet-user[65196]: Config: 1760173796 Oct 11 09:09:56 np0005481012 puppet-user[65196]: Puppet: 7.10.0 Oct 11 09:09:56 np0005481012 puppet-user[65184]: Warning: Unknown variable: 'ensure'. (file: /etc/puppet/modules/cinder/manifests/backup.pp, line: 94, column: 18) Oct 11 09:09:57 np0005481012 puppet-user[65184]: Warning: Unknown variable: 'ensure'. (file: /etc/puppet/modules/cinder/manifests/volume.pp, line: 69, column: 18) Oct 11 09:09:57 np0005481012 systemd[1]: libpod-2be9da9a05f8bbd163600d605d3e8b3733dffbdc223571a20282feb2b9badf91.scope: Deactivated successfully. Oct 11 09:09:57 np0005481012 systemd[1]: libpod-2be9da9a05f8bbd163600d605d3e8b3733dffbdc223571a20282feb2b9badf91.scope: Consumed 2.585s CPU time. Oct 11 09:09:57 np0005481012 podman[65027]: 2025-10-11 09:09:57.108205614 +0000 UTC m=+2.978950753 container died 2be9da9a05f8bbd163600d605d3e8b3733dffbdc223571a20282feb2b9badf91 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, batch=17.1_20250721.1, container_name=container-puppet-collectd, com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.9, description=Red Hat OpenStack Platform 17.1 collectd, name=rhosp17/openstack-collectd, managed_by=tripleo_ansible, tcib_managed=true, io.buildah.version=1.33.12, release=2, vendor=Red Hat, Inc., url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-collectd/images/17.1.9-2, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, build-date=2025-07-21T13:04:03, architecture=x86_64, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 collectd, distribution-scope=public, maintainer=OpenStack TripleO Team, vcs-type=git, com.redhat.component=openstack-collectd-container, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, vcs-ref=1c67cc222531545f43af554407dce9103c5ddf0b, io.openshift.tags=rhosp osp openstack osp-17.1) Oct 11 09:09:57 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-2be9da9a05f8bbd163600d605d3e8b3733dffbdc223571a20282feb2b9badf91-userdata-shm.mount: Deactivated successfully. Oct 11 09:09:57 np0005481012 systemd[1]: var-lib-containers-storage-overlay-9f9cb75e37ebe8c96e7367b0f7ac451a63b654349e101c219aa3a95719c192ee-merged.mount: Deactivated successfully. Oct 11 09:09:57 np0005481012 podman[65675]: 2025-10-11 09:09:57.24158265 +0000 UTC m=+0.119247769 container cleanup 2be9da9a05f8bbd163600d605d3e8b3733dffbdc223571a20282feb2b9badf91 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, summary=Red Hat OpenStack Platform 17.1 collectd, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1, distribution-scope=public, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-collectd/images/17.1.9-2, version=17.1.9, build-date=2025-07-21T13:04:03, io.buildah.version=1.33.12, description=Red Hat OpenStack Platform 17.1 collectd, name=rhosp17/openstack-collectd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, batch=17.1_20250721.1, container_name=container-puppet-collectd, architecture=x86_64, com.redhat.component=openstack-collectd-container, managed_by=tripleo_ansible, release=2, vcs-ref=1c67cc222531545f43af554407dce9103c5ddf0b, vendor=Red Hat, Inc., tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/agreements, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd) Oct 11 09:09:57 np0005481012 systemd[1]: libpod-74db54366355099473d508e5246984caf183e55c1f2bcabf7242c1ec5b0df89b.scope: Deactivated successfully. Oct 11 09:09:57 np0005481012 systemd[1]: libpod-74db54366355099473d508e5246984caf183e55c1f2bcabf7242c1ec5b0df89b.scope: Consumed 2.633s CPU time. Oct 11 09:09:57 np0005481012 systemd[1]: libpod-conmon-2be9da9a05f8bbd163600d605d3e8b3733dffbdc223571a20282feb2b9badf91.scope: Deactivated successfully. Oct 11 09:09:57 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-collectd --conmon-pidfile /run/container-puppet-collectd.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,collectd_client_config,exec --env NAME=collectd --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::metrics::collectd --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-collectd --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-collectd.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Oct 11 09:09:57 np0005481012 podman[65069]: 2025-10-11 09:09:57.251007081 +0000 UTC m=+3.084187668 container died 74db54366355099473d508e5246984caf183e55c1f2bcabf7242c1ec5b0df89b (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1, com.redhat.component=openstack-mariadb-container, description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., release=1, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, tcib_managed=true, managed_by=tripleo_ansible, version=17.1.9, name=rhosp17/openstack-mariadb, build-date=2025-07-21T12:58:45, io.buildah.version=1.33.12, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 mariadb, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, batch=17.1_20250721.1, com.redhat.license_terms=https://www.redhat.com/agreements, container_name=container-puppet-clustercheck, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb) Oct 11 09:09:57 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-74db54366355099473d508e5246984caf183e55c1f2bcabf7242c1ec5b0df89b-userdata-shm.mount: Deactivated successfully. Oct 11 09:09:57 np0005481012 podman[65722]: 2025-10-11 09:09:57.317523219 +0000 UTC m=+0.059384178 container cleanup 74db54366355099473d508e5246984caf183e55c1f2bcabf7242c1ec5b0df89b (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, description=Red Hat OpenStack Platform 17.1 mariadb, container_name=container-puppet-clustercheck, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, version=17.1.9, distribution-scope=public, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-mariadb-container, batch=17.1_20250721.1, build-date=2025-07-21T12:58:45, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/agreements, vendor=Red Hat, Inc., architecture=x86_64, name=rhosp17/openstack-mariadb, tcib_managed=true, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, io.buildah.version=1.33.12, release=1) Oct 11 09:09:57 np0005481012 systemd[1]: libpod-conmon-74db54366355099473d508e5246984caf183e55c1f2bcabf7242c1ec5b0df89b.scope: Deactivated successfully. Oct 11 09:09:57 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-clustercheck --conmon-pidfile /run/container-puppet-clustercheck.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file --env NAME=clustercheck --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::pacemaker::clustercheck --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-clustercheck --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-clustercheck.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Oct 11 09:09:57 np0005481012 systemd[1]: libpod-3ac3b413ed492397d0430a6f7e17e345299200757dbb8438a295bd5c86eee7b3.scope: Deactivated successfully. Oct 11 09:09:57 np0005481012 systemd[1]: libpod-3ac3b413ed492397d0430a6f7e17e345299200757dbb8438a295bd5c86eee7b3.scope: Consumed 2.810s CPU time. Oct 11 09:09:57 np0005481012 podman[65028]: 2025-10-11 09:09:57.406506881 +0000 UTC m=+3.270803670 container died 3ac3b413ed492397d0430a6f7e17e345299200757dbb8438a295bd5c86eee7b3 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, container_name=container-puppet-ceilometer, vcs-type=git, managed_by=tripleo_ansible, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-ceilometer-central/images/17.1.9-1, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.buildah.version=1.33.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, distribution-scope=public, tcib_managed=true, config_id=tripleo_puppet_step1, vcs-ref=1ce3db7211bdafb9cc5e59a103488bd6a8dc3f2f, name=rhosp17/openstack-ceilometer-central, build-date=2025-07-21T14:49:23, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-ceilometer-central-container, com.redhat.license_terms=https://www.redhat.com/agreements, batch=17.1_20250721.1, io.openshift.expose-services=, release=1, description=Red Hat OpenStack Platform 17.1 ceilometer-central, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.9, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, vendor=Red Hat, Inc.) Oct 11 09:09:57 np0005481012 puppet-user[65165]: Warning: Scope(Glance::Backend::Multistore::Swift[default_backend]): The swift_store_config_file parameter is deprecated Oct 11 09:09:57 np0005481012 puppet-user[65165]: Warning: Scope(Apache::Vhost[glance-api-proxy]): Oct 11 09:09:57 np0005481012 puppet-user[65165]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Oct 11 09:09:57 np0005481012 puppet-user[65165]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Oct 11 09:09:57 np0005481012 puppet-user[65165]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Oct 11 09:09:57 np0005481012 puppet-user[65165]: file names. Oct 11 09:09:57 np0005481012 puppet-user[65165]: Oct 11 09:09:57 np0005481012 puppet-user[65165]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Oct 11 09:09:57 np0005481012 puppet-user[65165]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Oct 11 09:09:57 np0005481012 puppet-user[65165]: sanitized $servername parameter when not explicitly defined. Oct 11 09:09:57 np0005481012 podman[65778]: 2025-10-11 09:09:57.477247469 +0000 UTC m=+0.111925983 container cleanup 3ac3b413ed492397d0430a6f7e17e345299200757dbb8438a295bd5c86eee7b3 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, release=1, com.redhat.component=openstack-ceilometer-central-container, name=rhosp17/openstack-ceilometer-central, distribution-scope=public, container_name=container-puppet-ceilometer, vcs-ref=1ce3db7211bdafb9cc5e59a103488bd6a8dc3f2f, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-ceilometer-central/images/17.1.9-1, version=17.1.9, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.tags=rhosp osp openstack osp-17.1, vendor=Red Hat, Inc., io.openshift.expose-services=, batch=17.1_20250721.1, description=Red Hat OpenStack Platform 17.1 ceilometer-central, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/agreements, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, io.buildah.version=1.33.12, managed_by=tripleo_ansible, tcib_managed=true, build-date=2025-07-21T14:49:23, vcs-type=git, maintainer=OpenStack TripleO Team) Oct 11 09:09:57 np0005481012 systemd[1]: libpod-conmon-3ac3b413ed492397d0430a6f7e17e345299200757dbb8438a295bd5c86eee7b3.scope: Deactivated successfully. Oct 11 09:09:57 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-ceilometer --conmon-pidfile /run/container-puppet-ceilometer.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config --env NAME=ceilometer --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::ceilometer::agent::polling#012#012include tripleo::profile::base::ceilometer::agent::notification#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-ceilometer --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-ceilometer.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Oct 11 09:09:57 np0005481012 puppet-user[65168]: Warning: Scope(Glance::Backend::Multistore::Swift[default_backend]): The swift_store_config_file parameter is deprecated Oct 11 09:09:57 np0005481012 puppet-user[65168]: Warning: Scope(Apache::Vhost[glance-api-proxy]): Oct 11 09:09:57 np0005481012 puppet-user[65168]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Oct 11 09:09:57 np0005481012 puppet-user[65168]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Oct 11 09:09:57 np0005481012 puppet-user[65168]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Oct 11 09:09:57 np0005481012 puppet-user[65168]: file names. Oct 11 09:09:57 np0005481012 puppet-user[65168]: Oct 11 09:09:57 np0005481012 puppet-user[65168]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Oct 11 09:09:57 np0005481012 puppet-user[65168]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Oct 11 09:09:57 np0005481012 puppet-user[65168]: sanitized $servername parameter when not explicitly defined. Oct 11 09:09:57 np0005481012 puppet-user[65184]: Warning: Unknown variable: '::pacemaker::pcs_010'. (file: /etc/puppet/modules/pacemaker/manifests/resource/bundle.pp, line: 159, column: 6) Oct 11 09:09:57 np0005481012 puppet-user[65184]: Warning: Unknown variable: '::pacemaker::pcs_010'. (file: /etc/puppet/modules/pacemaker/manifests/resource/bundle.pp, line: 159, column: 6) Oct 11 09:09:57 np0005481012 puppet-user[65184]: Warning: Scope(Apache::Vhost[cinder_wsgi]): Oct 11 09:09:57 np0005481012 puppet-user[65184]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Oct 11 09:09:57 np0005481012 puppet-user[65184]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Oct 11 09:09:57 np0005481012 puppet-user[65184]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Oct 11 09:09:57 np0005481012 puppet-user[65184]: file names. Oct 11 09:09:57 np0005481012 puppet-user[65184]: Oct 11 09:09:57 np0005481012 puppet-user[65184]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Oct 11 09:09:57 np0005481012 puppet-user[65184]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Oct 11 09:09:57 np0005481012 puppet-user[65184]: sanitized $servername parameter when not explicitly defined. Oct 11 09:09:57 np0005481012 puppet-user[65165]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 1.49 seconds Oct 11 09:09:57 np0005481012 podman[65870]: 2025-10-11 09:09:57.711489025 +0000 UTC m=+0.086648571 container create 1bc986afcd03beae292245f148d96a55b983aa609e11e6929c9cfca5e76dd00c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, distribution-scope=public, vcs-ref=50ad31a3907524465c6c121b4205bf5b43d43530, version=17.1.9, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/agreements, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.33.12, maintainer=OpenStack TripleO Team, container_name=container-puppet-heat_api, io.openshift.tags=rhosp osp openstack osp-17.1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-heat-api/images/17.1.9-1, build-date=2025-07-21T15:56:26, com.redhat.component=openstack-heat-api-container, architecture=x86_64, config_id=tripleo_puppet_step1, io.openshift.expose-services=, vendor=Red Hat, Inc., name=rhosp17/openstack-heat-api, release=1, managed_by=tripleo_ansible, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20250721.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, description=Red Hat OpenStack Platform 17.1 heat-api) Oct 11 09:09:57 np0005481012 puppet-user[65168]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 1.57 seconds Oct 11 09:09:57 np0005481012 puppet-user[65184]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 1.59 seconds Oct 11 09:09:57 np0005481012 systemd[1]: Started libpod-conmon-1bc986afcd03beae292245f148d96a55b983aa609e11e6929c9cfca5e76dd00c.scope. Oct 11 09:09:57 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:09:57 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/be3bd6167f4a275f804f7041d4be1ccce8dda8f684bfb48675b1b31928bd0509/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:09:57 np0005481012 podman[65870]: 2025-10-11 09:09:57.670987762 +0000 UTC m=+0.046147308 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Oct 11 09:09:57 np0005481012 podman[65870]: 2025-10-11 09:09:57.774579676 +0000 UTC m=+0.149739232 container init 1bc986afcd03beae292245f148d96a55b983aa609e11e6929c9cfca5e76dd00c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, container_name=container-puppet-heat_api, build-date=2025-07-21T15:56:26, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, vendor=Red Hat, Inc., managed_by=tripleo_ansible, vcs-type=git, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.33.12, description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1, distribution-scope=public, release=1, tcib_managed=true, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-heat-api/images/17.1.9-1, com.redhat.license_terms=https://www.redhat.com/agreements, version=17.1.9, config_id=tripleo_puppet_step1, batch=17.1_20250721.1, name=rhosp17/openstack-heat-api, vcs-ref=50ad31a3907524465c6c121b4205bf5b43d43530, com.redhat.component=openstack-heat-api-container, summary=Red Hat OpenStack Platform 17.1 heat-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Oct 11 09:09:57 np0005481012 podman[65870]: 2025-10-11 09:09:57.785640618 +0000 UTC m=+0.160800134 container start 1bc986afcd03beae292245f148d96a55b983aa609e11e6929c9cfca5e76dd00c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, io.openshift.expose-services=, vendor=Red Hat, Inc., container_name=container-puppet-heat_api, com.redhat.license_terms=https://www.redhat.com/agreements, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, architecture=x86_64, version=17.1.9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, name=rhosp17/openstack-heat-api, release=1, maintainer=OpenStack TripleO Team, batch=17.1_20250721.1, managed_by=tripleo_ansible, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-heat-api/images/17.1.9-1, summary=Red Hat OpenStack Platform 17.1 heat-api, tcib_managed=true, vcs-ref=50ad31a3907524465c6c121b4205bf5b43d43530, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1, build-date=2025-07-21T15:56:26, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.33.12, distribution-scope=public, com.redhat.component=openstack-heat-api-container) Oct 11 09:09:57 np0005481012 podman[65870]: 2025-10-11 09:09:57.788439805 +0000 UTC m=+0.163599391 container attach 1bc986afcd03beae292245f148d96a55b983aa609e11e6929c9cfca5e76dd00c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, version=17.1.9, tcib_managed=true, managed_by=tripleo_ansible, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-heat-api/images/17.1.9-1, vcs-type=git, batch=17.1_20250721.1, description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1, container_name=container-puppet-heat_api, architecture=x86_64, build-date=2025-07-21T15:56:26, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.33.12, maintainer=OpenStack TripleO Team, vcs-ref=50ad31a3907524465c6c121b4205bf5b43d43530, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1, com.redhat.component=openstack-heat-api-container, summary=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, config_id=tripleo_puppet_step1, name=rhosp17/openstack-heat-api, com.redhat.license_terms=https://www.redhat.com/agreements) Oct 11 09:09:57 np0005481012 podman[65922]: 2025-10-11 09:09:57.833317503 +0000 UTC m=+0.066145987 container create 691486a5ac592d18cdd7230828f2c1ae0ae3fe94a3f19bb01aeedbed576146b6 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, distribution-scope=public, release=1, batch=17.1_20250721.1, tcib_managed=true, build-date=2025-07-21T14:49:55, managed_by=tripleo_ansible, architecture=x86_64, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-heat-api-cfn/images/17.1.9-1, io.buildah.version=1.33.12, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.openshift.tags=rhosp osp openstack osp-17.1, vcs-ref=4e7292fd77cd8185d9d69d0a3a4974e7b22feb99, config_id=tripleo_puppet_step1, container_name=container-puppet-heat_api_cfn, version=17.1.9, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, com.redhat.component=openstack-heat-api-cfn-container, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/agreements, name=rhosp17/openstack-heat-api-cfn, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-type=git) Oct 11 09:09:57 np0005481012 systemd[1]: Started libpod-conmon-691486a5ac592d18cdd7230828f2c1ae0ae3fe94a3f19bb01aeedbed576146b6.scope. Oct 11 09:09:57 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:09:57 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/88f8038253fa807358d18a38c5d693b6434bfb55e0b53a4ff57d39d50e86245d/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:09:57 np0005481012 podman[65922]: 2025-10-11 09:09:57.892958098 +0000 UTC m=+0.125786592 container init 691486a5ac592d18cdd7230828f2c1ae0ae3fe94a3f19bb01aeedbed576146b6 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, com.redhat.component=openstack-heat-api-cfn-container, io.openshift.expose-services=, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-heat-api-cfn/images/17.1.9-1, io.buildah.version=1.33.12, batch=17.1_20250721.1, version=17.1.9, io.openshift.tags=rhosp osp openstack osp-17.1, com.redhat.license_terms=https://www.redhat.com/agreements, build-date=2025-07-21T14:49:55, vendor=Red Hat, Inc., vcs-ref=4e7292fd77cd8185d9d69d0a3a4974e7b22feb99, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, distribution-scope=public, release=1, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, container_name=container-puppet-heat_api_cfn, name=rhosp17/openstack-heat-api-cfn, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, architecture=x86_64) Oct 11 09:09:57 np0005481012 podman[65922]: 2025-10-11 09:09:57.798821586 +0000 UTC m=+0.031650070 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Oct 11 09:09:57 np0005481012 podman[65922]: 2025-10-11 09:09:57.901583765 +0000 UTC m=+0.134412249 container start 691486a5ac592d18cdd7230828f2c1ae0ae3fe94a3f19bb01aeedbed576146b6 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, com.redhat.license_terms=https://www.redhat.com/agreements, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-type=git, vendor=Red Hat, Inc., architecture=x86_64, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, batch=17.1_20250721.1, io.openshift.tags=rhosp osp openstack osp-17.1, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, maintainer=OpenStack TripleO Team, build-date=2025-07-21T14:49:55, vcs-ref=4e7292fd77cd8185d9d69d0a3a4974e7b22feb99, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-heat-api-cfn/images/17.1.9-1, release=1, managed_by=tripleo_ansible, io.buildah.version=1.33.12, container_name=container-puppet-heat_api_cfn, com.redhat.component=openstack-heat-api-cfn-container, io.openshift.expose-services=, config_id=tripleo_puppet_step1, version=17.1.9, name=rhosp17/openstack-heat-api-cfn, distribution-scope=public) Oct 11 09:09:57 np0005481012 podman[65922]: 2025-10-11 09:09:57.901869134 +0000 UTC m=+0.134697648 container attach 691486a5ac592d18cdd7230828f2c1ae0ae3fe94a3f19bb01aeedbed576146b6 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, distribution-scope=public, architecture=x86_64, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.openshift.expose-services=, container_name=container-puppet-heat_api_cfn, com.redhat.license_terms=https://www.redhat.com/agreements, version=17.1.9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-type=git, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-heat-api-cfn/images/17.1.9-1, com.redhat.component=openstack-heat-api-cfn-container, release=1, batch=17.1_20250721.1, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.openshift.tags=rhosp osp openstack osp-17.1, managed_by=tripleo_ansible, vendor=Red Hat, Inc., vcs-ref=4e7292fd77cd8185d9d69d0a3a4974e7b22feb99, build-date=2025-07-21T14:49:55, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, name=rhosp17/openstack-heat-api-cfn, io.buildah.version=1.33.12) Oct 11 09:09:57 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Oct 11 09:09:57 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Oct 11 09:09:57 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Oct 11 09:09:57 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Oct 11 09:09:57 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Oct 11 09:09:57 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Oct 11 09:09:57 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Oct 11 09:09:57 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Oct 11 09:09:57 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}f141607bee438692c97e13f68dca080c381f287969c2d4b2d20d90cc2a7fde2d' Oct 11 09:09:57 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Oct 11 09:09:57 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}4f73037b8196b0bab62c9c1419ef1b40c67b2055f31a8617a1adf8493a295c5b' Oct 11 09:09:57 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Oct 11 09:09:57 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Oct 11 09:09:57 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Oct 11 09:09:57 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Oct 11 09:09:57 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Oct 11 09:09:57 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Oct 11 09:09:57 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Oct 11 09:09:57 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Oct 11 09:09:57 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}3251219f5952917a9363b8f382ca9f708ca266277afd0de97e444188006f0750' Oct 11 09:09:57 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Oct 11 09:09:57 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}4f73037b8196b0bab62c9c1419ef1b40c67b2055f31a8617a1adf8493a295c5b' Oct 11 09:09:57 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Oct 11 09:09:57 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Oct 11 09:09:57 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Oct 11 09:09:57 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Oct 11 09:09:57 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Cron::Db_purge/Cron[glance-manage db purge]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Cron::Db_purge/Cron[glance-manage db purge]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/www_authenticate_uri]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_type]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/www_authenticate_uri]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_type]/ensure: created Oct 11 09:09:58 np0005481012 systemd[1]: var-lib-containers-storage-overlay-5c46cde8c456d6b4618adb65b532083fe32865dfe5cbfc23e36bc8c6a2770225-merged.mount: Deactivated successfully. Oct 11 09:09:58 np0005481012 systemd[1]: var-lib-containers-storage-overlay-8af323a6bd6cb1a6accb0643601d9aa60a3521a33628aed6747c06f20d3c950a-merged.mount: Deactivated successfully. Oct 11 09:09:58 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-3ac3b413ed492397d0430a6f7e17e345299200757dbb8438a295bd5c86eee7b3-userdata-shm.mount: Deactivated successfully. Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcached_servers]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/region_name]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_url]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcached_servers]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/username]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/region_name]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/password]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/user_domain_name]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_url]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_name]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_domain_name]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/username]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/password]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/user_domain_name]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_name]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/interface]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_domain_name]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/debug]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/interface]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_file]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_dir]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/debug]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_file]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_dir]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Tripleo::Profile::Base::Lvm/Augeas[udev options in lvm.conf]/returns: executed successfully Oct 11 09:09:58 np0005481012 podman[66009]: 2025-10-11 09:09:58.64019645 +0000 UTC m=+0.059923404 container create 5b41e444621652539e11dde43b87626b678b2cad9c435bc41be117f772061adf (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, vcs-ref=c3dd74fd14112210ad2ff230577dea7bb5deaa50, vcs-type=git, version=17.1.9, io.buildah.version=1.33.12, com.redhat.license_terms=https://www.redhat.com/agreements, config_id=tripleo_puppet_step1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-07-21T13:08:11, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-haproxy/images/17.1.9-1, maintainer=OpenStack TripleO Team, container_name=container-puppet-haproxy, io.openshift.tags=rhosp osp openstack osp-17.1, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, description=Red Hat OpenStack Platform 17.1 haproxy, name=rhosp17/openstack-haproxy, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, batch=17.1_20250721.1, release=1, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, tcib_managed=true, managed_by=tripleo_ansible, io.openshift.expose-services=) Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}497fa2ce9933be28501f1fc33c6df9353a8b4920e7aede5589ffb72e0272a4bb' Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}4f73037b8196b0bab62c9c1419ef1b40c67b2055f31a8617a1adf8493a295c5b' Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Oct 11 09:09:58 np0005481012 systemd[1]: Started libpod-conmon-5b41e444621652539e11dde43b87626b678b2cad9c435bc41be117f772061adf.scope. Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Policy/Oslo::Policy[glance_api_config]/Glance_api_config[oslo_policy/policy_file]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Oct 11 09:09:58 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Oct 11 09:09:58 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/ed48bbcc6102e1e8483f3ea8c7dab70abb88ac13985448cf9f0409290b35620b/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Oct 11 09:09:58 np0005481012 podman[66009]: 2025-10-11 09:09:58.693691395 +0000 UTC m=+0.113418349 container init 5b41e444621652539e11dde43b87626b678b2cad9c435bc41be117f772061adf (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, config_id=tripleo_puppet_step1, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, tcib_managed=true, managed_by=tripleo_ansible, batch=17.1_20250721.1, io.openshift.expose-services=, architecture=x86_64, build-date=2025-07-21T13:08:11, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=c3dd74fd14112210ad2ff230577dea7bb5deaa50, container_name=container-puppet-haproxy, name=rhosp17/openstack-haproxy, version=17.1.9, com.redhat.license_terms=https://www.redhat.com/agreements, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, summary=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, release=1, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1, io.buildah.version=1.33.12, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 haproxy, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-haproxy/images/17.1.9-1, maintainer=OpenStack TripleO Team) Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Policy/Oslo::Policy[glance_api_config]/Glance_api_config[oslo_policy/policy_file]/ensure: created Oct 11 09:09:58 np0005481012 podman[66009]: 2025-10-11 09:09:58.698107702 +0000 UTC m=+0.117834656 container start 5b41e444621652539e11dde43b87626b678b2cad9c435bc41be117f772061adf (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, version=17.1.9, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, managed_by=tripleo_ansible, batch=17.1_20250721.1, io.openshift.expose-services=, name=rhosp17/openstack-haproxy, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1, com.redhat.license_terms=https://www.redhat.com/agreements, io.buildah.version=1.33.12, vendor=Red Hat, Inc., release=1, container_name=container-puppet-haproxy, description=Red Hat OpenStack Platform 17.1 haproxy, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-haproxy/images/17.1.9-1, distribution-scope=public, tcib_managed=true, build-date=2025-07-21T13:08:11, summary=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, vcs-ref=c3dd74fd14112210ad2ff230577dea7bb5deaa50) Oct 11 09:09:58 np0005481012 podman[66009]: 2025-10-11 09:09:58.698287557 +0000 UTC m=+0.118014511 container attach 5b41e444621652539e11dde43b87626b678b2cad9c435bc41be117f772061adf (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, com.redhat.license_terms=https://www.redhat.com/agreements, io.buildah.version=1.33.12, build-date=2025-07-21T13:08:11, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, name=rhosp17/openstack-haproxy, io.openshift.tags=rhosp osp openstack osp-17.1, distribution-scope=public, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 haproxy, description=Red Hat OpenStack Platform 17.1 haproxy, release=1, container_name=container-puppet-haproxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, managed_by=tripleo_ansible, version=17.1.9, tcib_managed=true, architecture=x86_64, com.redhat.component=openstack-haproxy-container, config_id=tripleo_puppet_step1, vcs-ref=c3dd74fd14112210ad2ff230577dea7bb5deaa50, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-haproxy/images/17.1.9-1, maintainer=OpenStack TripleO Team, batch=17.1_20250721.1) Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Oct 11 09:09:58 np0005481012 podman[66009]: 2025-10-11 09:09:58.611675858 +0000 UTC m=+0.031402832 image pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api::Db/Oslo::Db[glance_api_config]/Glance_api_config[database/connection]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api::Db/Oslo::Db[glance_api_config]/Glance_api_config[database/connection]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/api_paste_config]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/storage_availability_zone]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/default_availability_zone]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_create_container_on_put]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_create_container_on_put]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_endpoint_type]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_config_file]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/enable_v3_api]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/default_swift_reference]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_endpoint_type]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Glance/Cinder_config[DEFAULT/glance_api_servers]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_config_file]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/store_description]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/default_swift_reference]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/key]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_address]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_version]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user_domain_id]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/project_domain_id]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/store_description]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/key]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_address]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_version]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Rabbit[glance_api_config]/Glance_api_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/region_name]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user_domain_id]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/project_domain_id]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/interface]/ensure: created Oct 11 09:09:58 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Rabbit[glance_api_config]/Glance_api_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/auth_type]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Default[glance_api_config]/Glance_api_config[DEFAULT/transport_url]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/driver]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/transport_url]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/auth_url]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Default[glance_api_config]/Glance_api_config[DEFAULT/transport_url]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/username]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/user_domain_name]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/driver]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/password]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/transport_url]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/project_name]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/project_domain_name]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Api/Tripleo::Tls_proxy[glance-api]/Apache::Vhost[glance-api-proxy]/Concat[25-glance-api-proxy.conf]/File[/etc/httpd/conf.d/25-glance-api-proxy.conf]/ensure: defined content as '{sha256}312bab0078b169c06893484e0a9a19c73cc870084a1053541ac9e6f68deb39c7' Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Oct 11 09:09:59 np0005481012 systemd[1]: tmp-crun.JEvUgA.mount: Deactivated successfully. Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_host]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_port]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Api/Tripleo::Tls_proxy[glance-api]/Apache::Vhost[glance-api-proxy]/Concat[25-glance-api-proxy.conf]/File[/etc/httpd/conf.d/25-glance-api-proxy.conf]/ensure: defined content as '{sha256}bb1a7246a22222b949d454da1487a522ac0a4cf5b1d1b28fb171e9f2d1404fe4' Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/workers]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_image_direct_url]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Cron::Db_purge/Cron[cinder-manage db purge]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_host]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/osapi_volume_listen]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_port]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/osapi_volume_workers]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/workers]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_cache_dir]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/default_volume_type]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_image_direct_url]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_import_methods]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/node_staging_uri]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/auth_strategy]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_cache_dir]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_import_methods]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_member_quota]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Backup/Cinder_config[DEFAULT/backup_workers]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/node_staging_uri]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Backup/Cinder_config[DEFAULT/backup_max_operations]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/backup_driver]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_member_quota]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/swift_catalog_info]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/backup_swift_container]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_multiple_locations]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/backup_compression_algorithm]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_backends]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Scheduler/Cinder_config[DEFAULT/scheduler_driver]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_multiple_locations]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api/Glance_api_config[glance_store/default_backend]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Backends/Cinder_config[DEFAULT/enabled_backends]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_backends]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Backends/Cinder_config[tripleo_iscsi/backend_host]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api/Glance_cache_config[DEFAULT/image_cache_dir]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_import_opts/image_import_plugins]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api/Glance_api_config[glance_store/default_backend]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_conversion/output_format]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[inject_metadata_properties/ignore_user_roles]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api/Glance_api_config[paste_deploy/flavor]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Db/Oslo::Db[cinder_config]/Cinder_config[database/connection]/ensure: created Oct 11 09:09:59 np0005481012 ovs-vsctl[66065]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api/Glance_cache_config[DEFAULT/image_cache_dir]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Db/Oslo::Db[cinder_config]/Cinder_config[database/max_retries]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_import_opts/image_import_plugins]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_conversion/output_format]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[inject_metadata_properties/ignore_user_roles]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api/Oslo::Concurrency[glance_api_config]/Glance_api_config[oslo_concurrency/lock_path]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api/Glance_api_config[paste_deploy/flavor]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: /Stage[main]/Glance::Api/Oslo::Middleware[glance_api_config]/Glance_api_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65165]: Notice: Applied catalog in 1.81 seconds Oct 11 09:09:59 np0005481012 puppet-user[65165]: Application: Oct 11 09:09:59 np0005481012 puppet-user[65165]: Initial environment: production Oct 11 09:09:59 np0005481012 puppet-user[65165]: Converged environment: production Oct 11 09:09:59 np0005481012 puppet-user[65165]: Run mode: user Oct 11 09:09:59 np0005481012 puppet-user[65165]: Changes: Oct 11 09:09:59 np0005481012 puppet-user[65165]: Total: 92 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Events: Oct 11 09:09:59 np0005481012 puppet-user[65165]: Success: 92 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Total: 92 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Resources: Oct 11 09:09:59 np0005481012 puppet-user[65165]: Skipped: 38 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Changed: 92 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Out of sync: 92 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Total: 307 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Time: Oct 11 09:09:59 np0005481012 puppet-user[65165]: Concat file: 0.00 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Anchor: 0.00 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Concat fragment: 0.00 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Glance image import config: 0.00 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Glance swift config: 0.01 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Cron: 0.01 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Glance cache config: 0.01 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Augeas: 0.02 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Package: 0.02 Oct 11 09:09:59 np0005481012 puppet-user[65165]: File: 0.11 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Glance api config: 1.39 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Config retrieval: 1.63 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Transaction evaluation: 1.80 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Catalog application: 1.81 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Last run: 1760173799 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Resources: 0.00 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Total: 1.81 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Version: Oct 11 09:09:59 np0005481012 puppet-user[65165]: Config: 1760173796 Oct 11 09:09:59 np0005481012 puppet-user[65165]: Puppet: 7.10.0 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api/Oslo::Concurrency[glance_api_config]/Glance_api_config[oslo_concurrency/lock_path]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: /Stage[main]/Glance::Api/Oslo::Middleware[glance_api_config]/Glance_api_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Db/Oslo::Db[cinder_config]/Cinder_config[database/db_max_retries]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65168]: Notice: Applied catalog in 1.82 seconds Oct 11 09:09:59 np0005481012 puppet-user[65168]: Application: Oct 11 09:09:59 np0005481012 puppet-user[65168]: Initial environment: production Oct 11 09:09:59 np0005481012 puppet-user[65168]: Converged environment: production Oct 11 09:09:59 np0005481012 puppet-user[65168]: Run mode: user Oct 11 09:09:59 np0005481012 puppet-user[65168]: Changes: Oct 11 09:09:59 np0005481012 puppet-user[65168]: Total: 92 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Events: Oct 11 09:09:59 np0005481012 puppet-user[65168]: Success: 92 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Total: 92 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Resources: Oct 11 09:09:59 np0005481012 puppet-user[65168]: Skipped: 38 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Changed: 92 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Out of sync: 92 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Total: 307 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Time: Oct 11 09:09:59 np0005481012 puppet-user[65168]: Anchor: 0.00 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Concat file: 0.00 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Concat fragment: 0.00 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Glance image import config: 0.00 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Glance swift config: 0.01 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Cron: 0.01 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Glance cache config: 0.01 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Augeas: 0.02 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Package: 0.02 Oct 11 09:09:59 np0005481012 puppet-user[65168]: File: 0.11 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Glance api config: 1.41 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Config retrieval: 1.70 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Transaction evaluation: 1.81 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Catalog application: 1.82 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Last run: 1760173799 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Resources: 0.00 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Total: 1.82 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Version: Oct 11 09:09:59 np0005481012 puppet-user[65168]: Config: 1760173796 Oct 11 09:09:59 np0005481012 puppet-user[65168]: Puppet: 7.10.0 Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Rabbit[cinder_config]/Cinder_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Rabbit[cinder_config]/Cinder_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Oct 11 09:09:59 np0005481012 puppet-user[65948]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:09:59 np0005481012 puppet-user[65948]: (file: /etc/puppet/hiera.yaml) Oct 11 09:09:59 np0005481012 puppet-user[65948]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:09:59 np0005481012 puppet-user[65948]: (file & line not available) Oct 11 09:09:59 np0005481012 ovs-vsctl[66136]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Oct 11 09:09:59 np0005481012 puppet-user[65948]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:09:59 np0005481012 puppet-user[65948]: (file & line not available) Oct 11 09:09:59 np0005481012 puppet-user[65967]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:09:59 np0005481012 puppet-user[65967]: (file: /etc/puppet/hiera.yaml) Oct 11 09:09:59 np0005481012 puppet-user[65967]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:09:59 np0005481012 puppet-user[65967]: (file & line not available) Oct 11 09:09:59 np0005481012 puppet-user[65967]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:09:59 np0005481012 puppet-user[65967]: (file & line not available) Oct 11 09:09:59 np0005481012 puppet-user[65948]: Warning: Scope(Class[Heat]): The database_connection parameter is deprecated and will be \ Oct 11 09:09:59 np0005481012 puppet-user[65948]: removed in a future realse. Use heat::db::database_connection instead Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Default[cinder_config]/Cinder_config[DEFAULT/rpc_response_timeout]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Default[cinder_config]/Cinder_config[DEFAULT/transport_url]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65967]: Warning: Scope(Class[Heat]): The database_connection parameter is deprecated and will be \ Oct 11 09:10:00 np0005481012 puppet-user[65967]: removed in a future realse. Use heat::db::database_connection instead Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Default[cinder_config]/Cinder_config[DEFAULT/control_exchange]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Notifications[cinder_config]/Cinder_config[oslo_messaging_notifications/driver]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Notifications[cinder_config]/Cinder_config[oslo_messaging_notifications/transport_url]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder/Oslo::Concurrency[cinder_config]/Cinder_config[oslo_concurrency/lock_path]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Logging/Oslo::Log[cinder_config]/Cinder_config[DEFAULT/debug]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[66042]: Error: Facter: error while resolving custom fact "haproxy_version": undefined method `strip' for nil:NilClass Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Logging/Oslo::Log[cinder_config]/Cinder_config[DEFAULT/log_dir]/ensure: created Oct 11 09:10:00 np0005481012 systemd[1]: libpod-4f6a1d3a0242a2dd3f3e16fb05e5aec18eaa460ed373f80196098ca77265bca0.scope: Deactivated successfully. Oct 11 09:10:00 np0005481012 systemd[1]: libpod-4f6a1d3a0242a2dd3f3e16fb05e5aec18eaa460ed373f80196098ca77265bca0.scope: Consumed 5.738s CPU time. Oct 11 09:10:00 np0005481012 systemd[1]: libpod-400772ffa2b37bce0e5dc030d91a425ab369571bdbfe908771c773f5ef6cf332.scope: Deactivated successfully. Oct 11 09:10:00 np0005481012 systemd[1]: libpod-400772ffa2b37bce0e5dc030d91a425ab369571bdbfe908771c773f5ef6cf332.scope: Consumed 5.790s CPU time. Oct 11 09:10:00 np0005481012 podman[65026]: 2025-10-11 09:10:00.304074856 +0000 UTC m=+6.174562257 container died 4f6a1d3a0242a2dd3f3e16fb05e5aec18eaa460ed373f80196098ca77265bca0 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, vcs-type=git, batch=17.1_20250721.1, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=2f84cc38566abd7704c6fde71a06783a20987075, name=rhosp17/openstack-glance-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-glance-api/images/17.1.9-1, tcib_managed=true, build-date=2025-07-21T13:58:20, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1, com.redhat.component=openstack-glance-api-container, version=17.1.9, io.buildah.version=1.33.12, com.redhat.license_terms=https://www.redhat.com/agreements, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, release=1, managed_by=tripleo_ansible, container_name=container-puppet-glance_api) Oct 11 09:10:00 np0005481012 systemd[1]: tmp-crun.cFoDWr.mount: Deactivated successfully. Oct 11 09:10:00 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-4f6a1d3a0242a2dd3f3e16fb05e5aec18eaa460ed373f80196098ca77265bca0-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:00 np0005481012 systemd[1]: var-lib-containers-storage-overlay-ddfb1f44a5e20b78f738c500d7bf4e1988bd423b8c57331b52596bb47f66a4fb-merged.mount: Deactivated successfully. Oct 11 09:10:00 np0005481012 podman[65048]: 2025-10-11 09:10:00.359048687 +0000 UTC m=+6.207173766 container died 400772ffa2b37bce0e5dc030d91a425ab369571bdbfe908771c773f5ef6cf332 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/agreements, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-glance-api, vcs-type=git, release=1, io.openshift.tags=rhosp osp openstack osp-17.1, io.openshift.expose-services=, version=17.1.9, distribution-scope=public, container_name=container-puppet-glance_api_internal, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.33.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, build-date=2025-07-21T13:58:20, vcs-ref=2f84cc38566abd7704c6fde71a06783a20987075, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-glance-api/images/17.1.9-1, batch=17.1_20250721.1, config_id=tripleo_puppet_step1) Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/auth_type]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/region_name]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/auth_url]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/username]/ensure: created Oct 11 09:10:00 np0005481012 podman[66275]: 2025-10-11 09:10:00.477444659 +0000 UTC m=+0.164918763 container cleanup 4f6a1d3a0242a2dd3f3e16fb05e5aec18eaa460ed373f80196098ca77265bca0 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, io.buildah.version=1.33.12, description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-glance-api/images/17.1.9-1, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1, name=rhosp17/openstack-glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, architecture=x86_64, distribution-scope=public, build-date=2025-07-21T13:58:20, release=1, vendor=Red Hat, Inc., batch=17.1_20250721.1, com.redhat.license_terms=https://www.redhat.com/agreements, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=2f84cc38566abd7704c6fde71a06783a20987075, container_name=container-puppet-glance_api, com.redhat.component=openstack-glance-api-container, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.9) Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/password]/ensure: created Oct 11 09:10:00 np0005481012 systemd[1]: libpod-conmon-4f6a1d3a0242a2dd3f3e16fb05e5aec18eaa460ed373f80196098ca77265bca0.scope: Deactivated successfully. Oct 11 09:10:00 np0005481012 podman[66276]: 2025-10-11 09:10:00.494431014 +0000 UTC m=+0.180593747 container cleanup 400772ffa2b37bce0e5dc030d91a425ab369571bdbfe908771c773f5ef6cf332 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, batch=17.1_20250721.1, release=1, tcib_managed=true, version=17.1.9, build-date=2025-07-21T13:58:20, com.redhat.component=openstack-glance-api-container, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, name=rhosp17/openstack-glance-api, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/agreements, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=2f84cc38566abd7704c6fde71a06783a20987075, io.openshift.expose-services=, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-glance-api/images/17.1.9-1, io.buildah.version=1.33.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1, managed_by=tripleo_ansible, architecture=x86_64, container_name=container-puppet-glance_api_internal, vcs-type=git) Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/user_domain_name]/ensure: created Oct 11 09:10:00 np0005481012 systemd[1]: libpod-conmon-400772ffa2b37bce0e5dc030d91a425ab369571bdbfe908771c773f5ef6cf332.scope: Deactivated successfully. Oct 11 09:10:00 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-glance_api_internal --conmon-pidfile /run/container-puppet-glance_api_internal.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config --env NAME=glance_api_internal --env STEP_CONFIG=include ::tripleo::packages#012class { 'tripleo::profile::base::glance::api':#012 bind_port => 9293,#012 tls_proxy_port => 9293,#012 log_file => '/var/log/glance/api_internal.log',#012 show_image_direct_url => true,#012 show_multiple_locations => true,#012}#012#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-glance_api_internal --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-glance_api_internal.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/project_name]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/project_domain_name]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/send_service_user_token]/ensure: created Oct 11 09:10:00 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-glance_api --conmon-pidfile /run/container-puppet-glance_api.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config --env NAME=glance_api --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::glance::api#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-glance_api --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-glance_api.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/www_authenticate_uri]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/auth_type]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/memcached_servers]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/region_name]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/auth_url]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/username]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/password]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/user_domain_name]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/project_name]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/project_domain_name]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/interface]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Policy/Oslo::Policy[cinder_config]/Cinder_config[oslo_policy/policy_file]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Api/Oslo::Middleware[cinder_config]/Cinder_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[66042]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:00 np0005481012 puppet-user[66042]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:00 np0005481012 puppet-user[66042]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:00 np0005481012 puppet-user[66042]: (file & line not available) Oct 11 09:10:00 np0005481012 podman[66446]: 2025-10-11 09:10:00.90619167 +0000 UTC m=+0.055967372 container create 03e2fbd670d6a653a2191b9a3cc34282cdbf3f99150abebcbdc96b598ca86be4 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/agreements, description=Red Hat OpenStack Platform 17.1 heat-api, container_name=container-puppet-heat, architecture=x86_64, io.buildah.version=1.33.12, maintainer=OpenStack TripleO Team, batch=17.1_20250721.1, io.openshift.expose-services=, vendor=Red Hat, Inc., vcs-ref=50ad31a3907524465c6c121b4205bf5b43d43530, distribution-scope=public, managed_by=tripleo_ansible, version=17.1.9, release=1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, build-date=2025-07-21T15:56:26, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1, tcib_managed=true, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-heat-api/images/17.1.9-1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.component=openstack-heat-api-container) Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Wsgi::Apache/Openstacklib::Wsgi::Apache[cinder_wsgi]/File[/var/www/cgi-bin/cinder]/group: group changed 'root' to 'cinder' Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Wsgi::Apache/Openstacklib::Wsgi::Apache[cinder_wsgi]/File[cinder_wsgi]/ensure: defined content as '{sha256}4edb31cc3eee33c28f8a9c6c47aaad65265bca7f5a84782e4481666691daacea' Oct 11 09:10:00 np0005481012 puppet-user[65948]: Warning: Scope(Apache::Vhost[heat_api_wsgi]): Oct 11 09:10:00 np0005481012 puppet-user[65948]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Oct 11 09:10:00 np0005481012 systemd[1]: Started libpod-conmon-03e2fbd670d6a653a2191b9a3cc34282cdbf3f99150abebcbdc96b598ca86be4.scope. Oct 11 09:10:00 np0005481012 puppet-user[65948]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Oct 11 09:10:00 np0005481012 puppet-user[65948]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Oct 11 09:10:00 np0005481012 puppet-user[65948]: file names. Oct 11 09:10:00 np0005481012 puppet-user[65948]: Oct 11 09:10:00 np0005481012 puppet-user[65948]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Oct 11 09:10:00 np0005481012 puppet-user[65948]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Oct 11 09:10:00 np0005481012 puppet-user[65948]: sanitized $servername parameter when not explicitly defined. Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/volume_backend_name]/ensure: created Oct 11 09:10:00 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:00 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/7ebca2346a49e5abf47e7a1c5da00f62608945f0ac178a8166721f99f1220cf5/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:00 np0005481012 podman[66446]: 2025-10-11 09:10:00.951584924 +0000 UTC m=+0.101360626 container init 03e2fbd670d6a653a2191b9a3cc34282cdbf3f99150abebcbdc96b598ca86be4 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, tcib_managed=true, vcs-ref=50ad31a3907524465c6c121b4205bf5b43d43530, container_name=container-puppet-heat, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/agreements, name=rhosp17/openstack-heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-heat-api/images/17.1.9-1, managed_by=tripleo_ansible, version=17.1.9, batch=17.1_20250721.1, description=Red Hat OpenStack Platform 17.1 heat-api, vcs-type=git, distribution-scope=public, build-date=2025-07-21T15:56:26, maintainer=OpenStack TripleO Team, architecture=x86_64, com.redhat.component=openstack-heat-api-container, io.buildah.version=1.33.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, release=1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/volume_driver]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/target_ip_address]/ensure: created Oct 11 09:10:00 np0005481012 podman[66446]: 2025-10-11 09:10:00.962325576 +0000 UTC m=+0.112101278 container start 03e2fbd670d6a653a2191b9a3cc34282cdbf3f99150abebcbdc96b598ca86be4 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-heat-api/images/17.1.9-1, maintainer=OpenStack TripleO Team, vcs-ref=50ad31a3907524465c6c121b4205bf5b43d43530, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, name=rhosp17/openstack-heat-api, managed_by=tripleo_ansible, distribution-scope=public, vcs-type=git, batch=17.1_20250721.1, container_name=container-puppet-heat, version=17.1.9, summary=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.33.12, com.redhat.license_terms=https://www.redhat.com/agreements, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, io.openshift.expose-services=, tcib_managed=true, build-date=2025-07-21T15:56:26, com.redhat.component=openstack-heat-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, release=1, io.openshift.tags=rhosp osp openstack osp-17.1, vendor=Red Hat, Inc.) Oct 11 09:10:00 np0005481012 podman[66446]: 2025-10-11 09:10:00.962641326 +0000 UTC m=+0.112417028 container attach 03e2fbd670d6a653a2191b9a3cc34282cdbf3f99150abebcbdc96b598ca86be4 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, summary=Red Hat OpenStack Platform 17.1 heat-api, build-date=2025-07-21T15:56:26, io.openshift.expose-services=, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/agreements, name=rhosp17/openstack-heat-api, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.33.12, batch=17.1_20250721.1, managed_by=tripleo_ansible, container_name=container-puppet-heat, io.openshift.tags=rhosp osp openstack osp-17.1, architecture=x86_64, com.redhat.component=openstack-heat-api-container, vcs-type=git, tcib_managed=true, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-heat-api/images/17.1.9-1, version=17.1.9, maintainer=OpenStack TripleO Team, vcs-ref=50ad31a3907524465c6c121b4205bf5b43d43530, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, release=1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Oct 11 09:10:00 np0005481012 podman[66446]: 2025-10-11 09:10:00.873323843 +0000 UTC m=+0.023099575 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/target_helper]/ensure: created Oct 11 09:10:00 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/volumes_dir]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/target_protocol]/ensure: created Oct 11 09:10:01 np0005481012 podman[66466]: 2025-10-11 09:10:01.017548865 +0000 UTC m=+0.134468611 container create 3df4991805ed6e05417ede6974f19ed8892e0618bdc423a1c7abec0f92930e1e (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, container_name=container-puppet-horizon, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-horizon/images/17.1.9-1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, tcib_managed=true, architecture=x86_64, io.buildah.version=1.33.12, release=1, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, vcs-ref=ad1f6dbe9b4f6499ef64ed90ffb3ceeed90078a5, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 horizon, managed_by=tripleo_ansible, version=17.1.9, vendor=Red Hat, Inc., com.redhat.component=openstack-horizon-container, name=rhosp17/openstack-horizon, batch=17.1_20250721.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1, build-date=2025-07-21T13:58:15, summary=Red Hat OpenStack Platform 17.1 horizon, com.redhat.license_terms=https://www.redhat.com/agreements) Oct 11 09:10:01 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Oct 11 09:10:01 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Oct 11 09:10:01 np0005481012 puppet-user[66042]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:01 np0005481012 puppet-user[66042]: (file & line not available) Oct 11 09:10:01 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Oct 11 09:10:01 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Oct 11 09:10:01 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Oct 11 09:10:01 np0005481012 podman[66466]: 2025-10-11 09:10:00.938352175 +0000 UTC m=+0.055271931 image pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Oct 11 09:10:01 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Oct 11 09:10:01 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Oct 11 09:10:01 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Oct 11 09:10:01 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Oct 11 09:10:01 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Oct 11 09:10:01 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Oct 11 09:10:01 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Oct 11 09:10:01 np0005481012 puppet-user[65184]: Notice: /Stage[main]/Cinder::Wsgi::Apache/Openstacklib::Wsgi::Apache[cinder_wsgi]/Apache::Vhost[cinder_wsgi]/Concat[10-cinder_wsgi.conf]/File[/etc/httpd/conf.d/10-cinder_wsgi.conf]/ensure: defined content as '{sha256}16c3336cc0064623d56db17454f9603b9f3e15c183465bf3d13c8b3e66b4f8da' Oct 11 09:10:01 np0005481012 systemd[1]: Started libpod-conmon-3df4991805ed6e05417ede6974f19ed8892e0618bdc423a1c7abec0f92930e1e.scope. Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 1.34 seconds Oct 11 09:10:01 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:01 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/85a37bd40e4cab6ca1e59662a7abd1f93b1625e064406a99f4cc47e3793c2281/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:01 np0005481012 puppet-user[65184]: Notice: Applied catalog in 3.13 seconds Oct 11 09:10:01 np0005481012 podman[66466]: 2025-10-11 09:10:01.068057907 +0000 UTC m=+0.184977653 container init 3df4991805ed6e05417ede6974f19ed8892e0618bdc423a1c7abec0f92930e1e (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, batch=17.1_20250721.1, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-type=git, container_name=container-puppet-horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, com.redhat.component=openstack-horizon-container, release=1, version=17.1.9, build-date=2025-07-21T13:58:15, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, tcib_managed=true, managed_by=tripleo_ansible, name=rhosp17/openstack-horizon, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 horizon, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-horizon/images/17.1.9-1, vcs-ref=ad1f6dbe9b4f6499ef64ed90ffb3ceeed90078a5, io.buildah.version=1.33.12, description=Red Hat OpenStack Platform 17.1 horizon) Oct 11 09:10:01 np0005481012 puppet-user[65184]: Application: Oct 11 09:10:01 np0005481012 puppet-user[65184]: Initial environment: production Oct 11 09:10:01 np0005481012 puppet-user[65184]: Converged environment: production Oct 11 09:10:01 np0005481012 puppet-user[65184]: Run mode: user Oct 11 09:10:01 np0005481012 puppet-user[65184]: Changes: Oct 11 09:10:01 np0005481012 puppet-user[65184]: Total: 114 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Events: Oct 11 09:10:01 np0005481012 puppet-user[65184]: Success: 114 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Total: 114 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Resources: Oct 11 09:10:01 np0005481012 puppet-user[65184]: Changed: 114 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Out of sync: 114 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Skipped: 43 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Total: 381 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Time: Oct 11 09:10:01 np0005481012 puppet-user[65184]: Resources: 0.00 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Concat file: 0.00 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Anchor: 0.00 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Concat fragment: 0.00 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Cron: 0.01 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Package: 0.02 Oct 11 09:10:01 np0005481012 puppet-user[65184]: File: 0.11 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Augeas: 0.56 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Config retrieval: 1.82 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Last run: 1760173801 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Cinder config: 2.16 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Transaction evaluation: 3.12 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Catalog application: 3.13 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Total: 3.13 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Version: Oct 11 09:10:01 np0005481012 puppet-user[65184]: Config: 1760173796 Oct 11 09:10:01 np0005481012 puppet-user[65184]: Puppet: 7.10.0 Oct 11 09:10:01 np0005481012 podman[66466]: 2025-10-11 09:10:01.072956769 +0000 UTC m=+0.189876505 container start 3df4991805ed6e05417ede6974f19ed8892e0618bdc423a1c7abec0f92930e1e (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, architecture=x86_64, batch=17.1_20250721.1, tcib_managed=true, build-date=2025-07-21T13:58:15, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-horizon/images/17.1.9-1, io.buildah.version=1.33.12, com.redhat.license_terms=https://www.redhat.com/agreements, distribution-scope=public, version=17.1.9, vcs-ref=ad1f6dbe9b4f6499ef64ed90ffb3ceeed90078a5, com.redhat.component=openstack-horizon-container, release=1, name=rhosp17/openstack-horizon, config_id=tripleo_puppet_step1, vcs-type=git, io.openshift.expose-services=, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 horizon, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-horizon, io.openshift.tags=rhosp osp openstack osp-17.1, description=Red Hat OpenStack Platform 17.1 horizon) Oct 11 09:10:01 np0005481012 podman[66466]: 2025-10-11 09:10:01.073077582 +0000 UTC m=+0.189997318 container attach 3df4991805ed6e05417ede6974f19ed8892e0618bdc423a1c7abec0f92930e1e (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, architecture=x86_64, tcib_managed=true, container_name=container-puppet-horizon, build-date=2025-07-21T13:58:15, vendor=Red Hat, Inc., com.redhat.component=openstack-horizon-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.expose-services=, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20250721.1, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 horizon, summary=Red Hat OpenStack Platform 17.1 horizon, io.buildah.version=1.33.12, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1, vcs-type=git, version=17.1.9, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-horizon/images/17.1.9-1, release=1, name=rhosp17/openstack-horizon, maintainer=OpenStack TripleO Team, vcs-ref=ad1f6dbe9b4f6499ef64ed90ffb3ceeed90078a5) Oct 11 09:10:01 np0005481012 puppet-user[65967]: Warning: Scope(Apache::Vhost[heat_api_cfn_wsgi]): Oct 11 09:10:01 np0005481012 puppet-user[65967]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Oct 11 09:10:01 np0005481012 puppet-user[65967]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Oct 11 09:10:01 np0005481012 puppet-user[65967]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Oct 11 09:10:01 np0005481012 puppet-user[65967]: file names. Oct 11 09:10:01 np0005481012 puppet-user[65967]: Oct 11 09:10:01 np0005481012 puppet-user[65967]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Oct 11 09:10:01 np0005481012 puppet-user[65967]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Oct 11 09:10:01 np0005481012 puppet-user[65967]: sanitized $servername parameter when not explicitly defined. Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 1.36 seconds Oct 11 09:10:01 np0005481012 systemd[1]: tmp-crun.NMZWaP.mount: Deactivated successfully. Oct 11 09:10:01 np0005481012 systemd[1]: var-lib-containers-storage-overlay-118449cb5154ecb98708e22a11e0fbe450b0f5032f1f83061853ae4b87d8fb9d-merged.mount: Deactivated successfully. Oct 11 09:10:01 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-400772ffa2b37bce0e5dc030d91a425ab369571bdbfe908771c773f5ef6cf332-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin_password]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_user_domain_name]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_type]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_url]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat/Heat_config[trustee/username]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat/Heat_config[trustee/password]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat/Heat_config[trustee/project_domain_name]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat/Heat_config[trustee/user_domain_name]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/max_json_body_size]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/region_name_for_services]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat/Heat_config[ec2authtoken/auth_uri]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat/Heat_config[yaql/limit_iterators]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat/Heat_config[yaql/memory_quota]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Cache/Heat_config[resource_finder_cache/caching]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Cron::Purge_deleted/Cron[heat-manage purge_deleted]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[66042]: Warning: Unknown variable: '::pacemaker::pcs_010'. (file: /etc/puppet/modules/pacemaker/manifests/resource/bundle.pp, line: 159, column: 6) Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Api/Heat_config[heat_api/bind_host]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[66042]: Warning: Scope(Haproxy::Config[haproxy]): haproxy: The $merge_options parameter will default to true in the next major release. Please review the documentation regarding the implications. Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/www_authenticate_uri]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_type]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin_password]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_user_domain_name]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_type]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_url]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat/Heat_config[trustee/username]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat/Heat_config[trustee/password]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat/Heat_config[trustee/project_domain_name]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat/Heat_config[trustee/user_domain_name]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcached_servers]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/max_json_body_size]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/region_name_for_services]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/region_name]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_url]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat/Heat_config[ec2authtoken/auth_uri]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/username]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat/Heat_config[yaql/limit_iterators]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/password]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat/Heat_config[yaql/memory_quota]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/user_domain_name]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Cache/Heat_config[resource_finder_cache/caching]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_name]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_domain_name]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Cron::Purge_deleted/Cron[heat-manage purge_deleted]/ensure: created Oct 11 09:10:01 np0005481012 systemd[1]: libpod-bd6cb15c667fc5dc66bbbedca17e45a1ce606b57ad2af429bad46fcdf31b5322.scope: Deactivated successfully. Oct 11 09:10:01 np0005481012 systemd[1]: libpod-bd6cb15c667fc5dc66bbbedca17e45a1ce606b57ad2af429bad46fcdf31b5322.scope: Consumed 7.159s CPU time. Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/interface]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Api_cfn/Heat_config[heat_api_cfn/bind_host]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Oct 11 09:10:01 np0005481012 puppet-user[66042]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 0.89 seconds Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/connection]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/www_authenticate_uri]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_type]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/max_retries]/ensure: created Oct 11 09:10:01 np0005481012 podman[66557]: 2025-10-11 09:10:01.807115237 +0000 UTC m=+0.042697792 container died bd6cb15c667fc5dc66bbbedca17e45a1ce606b57ad2af429bad46fcdf31b5322 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., com.redhat.component=openstack-cinder-api-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1, build-date=2025-07-21T15:58:55, distribution-scope=public, name=rhosp17/openstack-cinder-api, io.buildah.version=1.33.12, vcs-type=git, batch=17.1_20250721.1, container_name=container-puppet-cinder, com.redhat.license_terms=https://www.redhat.com/agreements, version=17.1.9, release=1, architecture=x86_64, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 cinder-api, managed_by=tripleo_ansible, vcs-ref=9ec4c911b0dceec2244c71f081a5b32931afa57b, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-cinder-api/images/17.1.9-1) Oct 11 09:10:01 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-bd6cb15c667fc5dc66bbbedca17e45a1ce606b57ad2af429bad46fcdf31b5322-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:01 np0005481012 systemd[1]: var-lib-containers-storage-overlay-e77af82761360c7748caa3b2b9eaf66710fe25ca354efc1eec1ceb95a78f30b5-merged.mount: Deactivated successfully. Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/db_max_retries]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcached_servers]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/region_name]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_url]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/username]/ensure: created Oct 11 09:10:01 np0005481012 podman[66557]: 2025-10-11 09:10:01.880656971 +0000 UTC m=+0.116239496 container cleanup bd6cb15c667fc5dc66bbbedca17e45a1ce606b57ad2af429bad46fcdf31b5322 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, com.redhat.license_terms=https://www.redhat.com/agreements, distribution-scope=public, release=1, config_id=tripleo_puppet_step1, container_name=container-puppet-cinder, summary=Red Hat OpenStack Platform 17.1 cinder-api, build-date=2025-07-21T15:58:55, architecture=x86_64, batch=17.1_20250721.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, managed_by=tripleo_ansible, vcs-ref=9ec4c911b0dceec2244c71f081a5b32931afa57b, vendor=Red Hat, Inc., com.redhat.component=openstack-cinder-api-container, version=17.1.9, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 cinder-api, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp17/openstack-cinder-api, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-cinder-api/images/17.1.9-1, io.buildah.version=1.33.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, vcs-type=git, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1) Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/password]/ensure: created Oct 11 09:10:01 np0005481012 systemd[1]: libpod-conmon-bd6cb15c667fc5dc66bbbedca17e45a1ce606b57ad2af429bad46fcdf31b5322.scope: Deactivated successfully. Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/user_domain_name]/ensure: created Oct 11 09:10:01 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-cinder --conmon-pidfile /run/container-puppet-cinder.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line --env NAME=cinder --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::cinder::api#012include tripleo::profile::base::database::mysql::client#012#012include tripleo::profile::base::cinder::backup::swift#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::pacemaker::cinder::backup_bundle#012include tripleo::profile::base::cinder::scheduler#012#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::lvm#012include tripleo::profile::pacemaker::cinder::volume_bundle#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-cinder --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-cinder.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_name]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_domain_name]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/interface]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/connection]/ensure: created Oct 11 09:10:01 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/max_retries]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/db_max_retries]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/driver]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/transport_url]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[66042]: Notice: /Stage[main]/Haproxy/Haproxy::Instance[haproxy]/Haproxy::Config[haproxy]/Concat[/etc/haproxy/haproxy.cfg]/File[/etc/haproxy/haproxy.cfg]/content: content changed '{sha256}8afc9a0bcc462f08af54b6ac1cbfc3b8343b1feee00b4ab07d7a8c7b47065f0b' to '{sha256}229b290286a99f1556fa3603edf8024e5cfe53f6c87674c1c2135c93d1a7a985' Oct 11 09:10:02 np0005481012 puppet-user[66042]: Notice: /Stage[main]/Haproxy/Haproxy::Instance[haproxy]/Haproxy::Config[haproxy]/Concat[/etc/haproxy/haproxy.cfg]/File[/etc/haproxy/haproxy.cfg]/mode: mode changed '0644' to '0640' Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/rpc_response_timeout]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/transport_url]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat/Oslo::Middleware[heat_config]/Heat_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[66042]: Notice: Applied catalog in 0.20 seconds Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/expose_headers]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[66042]: Application: Oct 11 09:10:02 np0005481012 puppet-user[66042]: Initial environment: production Oct 11 09:10:02 np0005481012 puppet-user[66042]: Converged environment: production Oct 11 09:10:02 np0005481012 puppet-user[66042]: Run mode: user Oct 11 09:10:02 np0005481012 puppet-user[66042]: Changes: Oct 11 09:10:02 np0005481012 puppet-user[66042]: Total: 2 Oct 11 09:10:02 np0005481012 puppet-user[66042]: Events: Oct 11 09:10:02 np0005481012 puppet-user[66042]: Success: 2 Oct 11 09:10:02 np0005481012 puppet-user[66042]: Total: 2 Oct 11 09:10:02 np0005481012 puppet-user[66042]: Resources: Oct 11 09:10:02 np0005481012 puppet-user[66042]: Changed: 1 Oct 11 09:10:02 np0005481012 puppet-user[66042]: Out of sync: 1 Oct 11 09:10:02 np0005481012 puppet-user[66042]: Skipped: 34 Oct 11 09:10:02 np0005481012 puppet-user[66042]: Total: 76 Oct 11 09:10:02 np0005481012 puppet-user[66042]: Time: Oct 11 09:10:02 np0005481012 puppet-user[66042]: Concat file: 0.00 Oct 11 09:10:02 np0005481012 puppet-user[66042]: Concat fragment: 0.00 Oct 11 09:10:02 np0005481012 puppet-user[66042]: File: 0.08 Oct 11 09:10:02 np0005481012 puppet-user[66042]: Transaction evaluation: 0.20 Oct 11 09:10:02 np0005481012 puppet-user[66042]: Catalog application: 0.20 Oct 11 09:10:02 np0005481012 puppet-user[66042]: Config retrieval: 0.97 Oct 11 09:10:02 np0005481012 puppet-user[66042]: Last run: 1760173802 Oct 11 09:10:02 np0005481012 puppet-user[66042]: Total: 0.21 Oct 11 09:10:02 np0005481012 puppet-user[66042]: Version: Oct 11 09:10:02 np0005481012 puppet-user[66042]: Config: 1760173800 Oct 11 09:10:02 np0005481012 puppet-user[66042]: Puppet: 7.10.0 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/max_age]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/allow_headers]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/debug]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/driver]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/log_dir]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/transport_url]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/rpc_response_timeout]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/transport_url]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat/Oslo::Middleware[heat_config]/Heat_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/expose_headers]/ensure: created Oct 11 09:10:02 np0005481012 podman[66627]: 2025-10-11 09:10:02.211899647 +0000 UTC m=+0.060705528 container create d16624541ba8246aa2e3804fdd52142a8a37f296214d247abbfc829bbc2cd529 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, maintainer=OpenStack TripleO Team, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 iscsid, vendor=Red Hat, Inc., managed_by=tripleo_ansible, batch=17.1_20250721.1, io.openshift.tags=rhosp osp openstack osp-17.1, name=rhosp17/openstack-iscsid, config_id=tripleo_puppet_step1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, version=17.1.9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/agreements, build-date=2025-07-21T13:27:15, release=1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-iscsid/images/17.1.9-1, com.redhat.component=openstack-iscsid-container, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, vcs-ref=92ba14eeb90bb45ac0dcf02b7ce60e274a5ccbb2, summary=Red Hat OpenStack Platform 17.1 iscsid, container_name=container-puppet-iscsid, io.buildah.version=1.33.12, distribution-scope=public) Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/max_age]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/allow_headers]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/backend]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/debug]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/enabled]/ensure: created Oct 11 09:10:02 np0005481012 systemd[1]: Started libpod-conmon-d16624541ba8246aa2e3804fdd52142a8a37f296214d247abbfc829bbc2cd529.scope. Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/memcache_servers]/ensure: created Oct 11 09:10:02 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:02 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a772346e75ccf3595696b0b49ce539c58ebd87960b0634b812c2c932db3c3069/merged/tmp/iscsi.host supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:02 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a772346e75ccf3595696b0b49ce539c58ebd87960b0634b812c2c932db3c3069/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:02 np0005481012 podman[66627]: 2025-10-11 09:10:02.268153607 +0000 UTC m=+0.116959478 container init d16624541ba8246aa2e3804fdd52142a8a37f296214d247abbfc829bbc2cd529 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, vcs-ref=92ba14eeb90bb45ac0dcf02b7ce60e274a5ccbb2, io.buildah.version=1.33.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, container_name=container-puppet-iscsid, vcs-type=git, batch=17.1_20250721.1, com.redhat.component=openstack-iscsid-container, io.openshift.expose-services=, vendor=Red Hat, Inc., url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-iscsid/images/17.1.9-1, build-date=2025-07-21T13:27:15, release=1, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 iscsid, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1, name=rhosp17/openstack-iscsid, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 iscsid, com.redhat.license_terms=https://www.redhat.com/agreements, distribution-scope=public, version=17.1.9, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, maintainer=OpenStack TripleO Team) Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/tls_enabled]/ensure: created Oct 11 09:10:02 np0005481012 podman[66627]: 2025-10-11 09:10:02.275076571 +0000 UTC m=+0.123882442 container start d16624541ba8246aa2e3804fdd52142a8a37f296214d247abbfc829bbc2cd529 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, container_name=container-puppet-iscsid, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, vcs-type=git, batch=17.1_20250721.1, io.openshift.tags=rhosp osp openstack osp-17.1, description=Red Hat OpenStack Platform 17.1 iscsid, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-iscsid/images/17.1.9-1, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 iscsid, com.redhat.license_terms=https://www.redhat.com/agreements, version=17.1.9, architecture=x86_64, name=rhosp17/openstack-iscsid, config_id=tripleo_puppet_step1, vcs-ref=92ba14eeb90bb45ac0dcf02b7ce60e274a5ccbb2, distribution-scope=public, build-date=2025-07-21T13:27:15, release=1, com.redhat.component=openstack-iscsid-container, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, io.buildah.version=1.33.12) Oct 11 09:10:02 np0005481012 podman[66627]: 2025-10-11 09:10:02.275300128 +0000 UTC m=+0.124105999 container attach d16624541ba8246aa2e3804fdd52142a8a37f296214d247abbfc829bbc2cd529 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, vcs-type=git, name=rhosp17/openstack-iscsid, vcs-ref=92ba14eeb90bb45ac0dcf02b7ce60e274a5ccbb2, com.redhat.license_terms=https://www.redhat.com/agreements, description=Red Hat OpenStack Platform 17.1 iscsid, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-iscsid/images/17.1.9-1, tcib_managed=true, config_id=tripleo_puppet_step1, io.openshift.expose-services=, com.redhat.component=openstack-iscsid-container, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, version=17.1.9, batch=17.1_20250721.1, io.openshift.tags=rhosp osp openstack osp-17.1, release=1, architecture=x86_64, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, io.buildah.version=1.33.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, distribution-scope=public, container_name=container-puppet-iscsid, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-07-21T13:27:15, managed_by=tripleo_ansible) Oct 11 09:10:02 np0005481012 podman[66627]: 2025-10-11 09:10:02.184754478 +0000 UTC m=+0.033560339 image pull registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Policy/Oslo::Policy[heat_config]/Heat_config[oslo_policy/policy_file]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/log_dir]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}4a8e3d592743753aad5ff0b34a9abd014297b67688bd498257c3a61d163dd8c9' Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}4f73037b8196b0bab62c9c1419ef1b40c67b2055f31a8617a1adf8493a295c5b' Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/backend]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/enabled]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/memcache_servers]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Oct 11 09:10:02 np0005481012 systemd[1]: libpod-5b41e444621652539e11dde43b87626b678b2cad9c435bc41be117f772061adf.scope: Deactivated successfully. Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Oct 11 09:10:02 np0005481012 systemd[1]: libpod-5b41e444621652539e11dde43b87626b678b2cad9c435bc41be117f772061adf.scope: Consumed 3.548s CPU time. Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/tls_enabled]/ensure: created Oct 11 09:10:02 np0005481012 podman[66009]: 2025-10-11 09:10:02.435931266 +0000 UTC m=+3.855658220 container died 5b41e444621652539e11dde43b87626b678b2cad9c435bc41be117f772061adf (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, io.buildah.version=1.33.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, build-date=2025-07-21T13:08:11, description=Red Hat OpenStack Platform 17.1 haproxy, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-haproxy/images/17.1.9-1, io.openshift.tags=rhosp osp openstack osp-17.1, distribution-scope=public, io.openshift.expose-services=, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 haproxy, config_id=tripleo_puppet_step1, vcs-ref=c3dd74fd14112210ad2ff230577dea7bb5deaa50, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/agreements, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-haproxy-container, release=1, name=rhosp17/openstack-haproxy, version=17.1.9, architecture=x86_64, managed_by=tripleo_ansible, batch=17.1_20250721.1, maintainer=OpenStack TripleO Team, container_name=container-puppet-haproxy) Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Wsgi::Apache_api/Heat::Wsgi::Apache[api]/Openstacklib::Wsgi::Apache[heat_api_wsgi]/File[/var/www/cgi-bin/heat]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Wsgi::Apache_api/Heat::Wsgi::Apache[api]/Openstacklib::Wsgi::Apache[heat_api_wsgi]/File[heat_api_wsgi]/ensure: defined content as '{sha256}63c23a972f142aef4c001999d58b5cb122b43aa3aebf0785080bcc6e56385a66' Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Policy/Oslo::Policy[heat_config]/Heat_config[oslo_policy/policy_file]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: /Stage[main]/Heat::Wsgi::Apache_api/Heat::Wsgi::Apache[api]/Openstacklib::Wsgi::Apache[heat_api_wsgi]/Apache::Vhost[heat_api_wsgi]/Concat[10-heat_api_wsgi.conf]/File[/etc/httpd/conf.d/10-heat_api_wsgi.conf]/ensure: defined content as '{sha256}68e2733ac4813f6d19f45e623506fea93d336731e32b154ed76ea323e12cf2cd' Oct 11 09:10:02 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-5b41e444621652539e11dde43b87626b678b2cad9c435bc41be117f772061adf-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}a6064495d47dbdb864435453c6a5c5ad889823989e2c3445cd8889629f705ed0' Oct 11 09:10:02 np0005481012 systemd[1]: var-lib-containers-storage-overlay-ed48bbcc6102e1e8483f3ea8c7dab70abb88ac13985448cf9f0409290b35620b-merged.mount: Deactivated successfully. Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}4f73037b8196b0bab62c9c1419ef1b40c67b2055f31a8617a1adf8493a295c5b' Oct 11 09:10:02 np0005481012 puppet-user[65948]: Notice: Applied catalog in 1.26 seconds Oct 11 09:10:02 np0005481012 puppet-user[65948]: Application: Oct 11 09:10:02 np0005481012 puppet-user[65948]: Initial environment: production Oct 11 09:10:02 np0005481012 puppet-user[65948]: Converged environment: production Oct 11 09:10:02 np0005481012 puppet-user[65948]: Run mode: user Oct 11 09:10:02 np0005481012 puppet-user[65948]: Changes: Oct 11 09:10:02 np0005481012 puppet-user[65948]: Total: 89 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Events: Oct 11 09:10:02 np0005481012 puppet-user[65948]: Success: 89 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Total: 89 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Resources: Oct 11 09:10:02 np0005481012 puppet-user[65948]: Skipped: 31 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Changed: 89 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Out of sync: 89 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Total: 331 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Time: Oct 11 09:10:02 np0005481012 puppet-user[65948]: Concat file: 0.00 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Anchor: 0.00 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Concat fragment: 0.00 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Cron: 0.01 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Package: 0.02 Oct 11 09:10:02 np0005481012 puppet-user[65948]: File: 0.11 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Heat config: 0.81 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Transaction evaluation: 1.25 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Catalog application: 1.26 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Config retrieval: 1.54 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Last run: 1760173802 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Resources: 0.00 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Total: 1.26 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Version: Oct 11 09:10:02 np0005481012 puppet-user[65948]: Config: 1760173799 Oct 11 09:10:02 np0005481012 puppet-user[65948]: Puppet: 7.10.0 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Oct 11 09:10:02 np0005481012 podman[66697]: 2025-10-11 09:10:02.520063009 +0000 UTC m=+0.072521975 container cleanup 5b41e444621652539e11dde43b87626b678b2cad9c435bc41be117f772061adf (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, vcs-type=git, maintainer=OpenStack TripleO Team, container_name=container-puppet-haproxy, summary=Red Hat OpenStack Platform 17.1 haproxy, version=17.1.9, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, batch=17.1_20250721.1, io.buildah.version=1.33.12, config_id=tripleo_puppet_step1, build-date=2025-07-21T13:08:11, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, distribution-scope=public, io.openshift.expose-services=, tcib_managed=true, release=1, io.openshift.tags=rhosp osp openstack osp-17.1, vcs-ref=c3dd74fd14112210ad2ff230577dea7bb5deaa50, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, com.redhat.license_terms=https://www.redhat.com/agreements, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-haproxy/images/17.1.9-1, vendor=Red Hat, Inc., architecture=x86_64, name=rhosp17/openstack-haproxy, description=Red Hat OpenStack Platform 17.1 haproxy) Oct 11 09:10:02 np0005481012 systemd[1]: libpod-conmon-5b41e444621652539e11dde43b87626b678b2cad9c435bc41be117f772061adf.scope: Deactivated successfully. Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Oct 11 09:10:02 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-haproxy --conmon-pidfile /run/container-puppet-haproxy.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,haproxy_config --env NAME=haproxy --env STEP_CONFIG=include ::tripleo::packages#012exec {'wait-for-settle': command => '/bin/true' }#012class tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}#012['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }#012include tripleo::profile::pacemaker::haproxy_bundle --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-haproxy --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-haproxy.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro --volume /etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro --volume /etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Wsgi::Apache_api_cfn/Heat::Wsgi::Apache[api_cfn]/Openstacklib::Wsgi::Apache[heat_api_cfn_wsgi]/File[/var/www/cgi-bin/heat]/ensure: created Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Wsgi::Apache_api_cfn/Heat::Wsgi::Apache[api_cfn]/Openstacklib::Wsgi::Apache[heat_api_cfn_wsgi]/File[heat_api_cfn_wsgi]/ensure: defined content as '{sha256}00dfd79a2e891b11ddd21cb5ce9d8c56f440a274b42eb9e7e9616c7c7e326582' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: /Stage[main]/Heat::Wsgi::Apache_api_cfn/Heat::Wsgi::Apache[api_cfn]/Openstacklib::Wsgi::Apache[heat_api_cfn_wsgi]/Apache::Vhost[heat_api_cfn_wsgi]/Concat[10-heat_api_cfn_wsgi.conf]/File[/etc/httpd/conf.d/10-heat_api_cfn_wsgi.conf]/ensure: defined content as '{sha256}94c52965d7e8f13e1d1fdba23758319c1b3651d8b035bbc76374d2dd1c6aac70' Oct 11 09:10:02 np0005481012 puppet-user[65967]: Notice: Applied catalog in 1.19 seconds Oct 11 09:10:02 np0005481012 puppet-user[65967]: Application: Oct 11 09:10:02 np0005481012 puppet-user[65967]: Initial environment: production Oct 11 09:10:02 np0005481012 puppet-user[65967]: Converged environment: production Oct 11 09:10:02 np0005481012 puppet-user[65967]: Run mode: user Oct 11 09:10:02 np0005481012 puppet-user[65967]: Changes: Oct 11 09:10:02 np0005481012 puppet-user[65967]: Total: 90 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Events: Oct 11 09:10:02 np0005481012 puppet-user[65967]: Success: 90 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Total: 90 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Resources: Oct 11 09:10:02 np0005481012 puppet-user[65967]: Skipped: 32 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Changed: 90 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Out of sync: 90 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Total: 333 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Time: Oct 11 09:10:02 np0005481012 puppet-user[65967]: Concat file: 0.00 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Anchor: 0.00 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Concat fragment: 0.00 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Cron: 0.01 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Package: 0.02 Oct 11 09:10:02 np0005481012 puppet-user[65967]: File: 0.11 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Heat config: 0.77 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Transaction evaluation: 1.18 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Catalog application: 1.19 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Config retrieval: 1.57 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Last run: 1760173802 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Resources: 0.00 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Total: 1.19 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Version: Oct 11 09:10:02 np0005481012 puppet-user[65967]: Config: 1760173799 Oct 11 09:10:02 np0005481012 puppet-user[65967]: Puppet: 7.10.0 Oct 11 09:10:02 np0005481012 ovs-vsctl[66770]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Oct 11 09:10:02 np0005481012 podman[66771]: 2025-10-11 09:10:02.839016084 +0000 UTC m=+0.076734444 container create 806a0217ac4725b660ae161c8642c97ea8bfc8baff6f4526b29bb90ffa70d307 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 keystone, distribution-scope=public, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.tags=rhosp osp openstack osp-17.1, vcs-ref=0693142a4093f932157b8019660e85aa608befc8, version=17.1.9, release=1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-keystone/images/17.1.9-1, description=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, batch=17.1_20250721.1, com.redhat.component=openstack-keystone-container, container_name=container-puppet-keystone, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, io.openshift.expose-services=, name=rhosp17/openstack-keystone, io.buildah.version=1.33.12, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, build-date=2025-07-21T13:27:18) Oct 11 09:10:02 np0005481012 systemd[1]: Started libpod-conmon-806a0217ac4725b660ae161c8642c97ea8bfc8baff6f4526b29bb90ffa70d307.scope. Oct 11 09:10:02 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:02 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/328eef90dda1e2954fcff920ffa35da864bde01e433227cd34584a8716487c23/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:02 np0005481012 puppet-user[66496]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:02 np0005481012 puppet-user[66496]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:02 np0005481012 podman[66771]: 2025-10-11 09:10:02.878027771 +0000 UTC m=+0.115746131 container init 806a0217ac4725b660ae161c8642c97ea8bfc8baff6f4526b29bb90ffa70d307 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-keystone/images/17.1.9-1, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, description=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, batch=17.1_20250721.1, io.buildah.version=1.33.12, com.redhat.component=openstack-keystone-container, io.openshift.tags=rhosp osp openstack osp-17.1, distribution-scope=public, vendor=Red Hat, Inc., io.openshift.expose-services=, release=1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-keystone, vcs-type=git, tcib_managed=true, version=17.1.9, summary=Red Hat OpenStack Platform 17.1 keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, container_name=container-puppet-keystone, build-date=2025-07-21T13:27:18, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-ref=0693142a4093f932157b8019660e85aa608befc8, config_id=tripleo_puppet_step1, architecture=x86_64, managed_by=tripleo_ansible) Oct 11 09:10:02 np0005481012 puppet-user[66496]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:02 np0005481012 puppet-user[66496]: (file & line not available) Oct 11 09:10:02 np0005481012 podman[66771]: 2025-10-11 09:10:02.88282645 +0000 UTC m=+0.120544820 container start 806a0217ac4725b660ae161c8642c97ea8bfc8baff6f4526b29bb90ffa70d307 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, batch=17.1_20250721.1, container_name=container-puppet-keystone, vcs-ref=0693142a4093f932157b8019660e85aa608befc8, description=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/agreements, config_id=tripleo_puppet_step1, release=1, distribution-scope=public, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, io.buildah.version=1.33.12, com.redhat.component=openstack-keystone-container, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, vendor=Red Hat, Inc., architecture=x86_64, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 keystone, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-keystone/images/17.1.9-1, io.openshift.tags=rhosp osp openstack osp-17.1, version=17.1.9, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-07-21T13:27:18, name=rhosp17/openstack-keystone) Oct 11 09:10:02 np0005481012 podman[66771]: 2025-10-11 09:10:02.883998865 +0000 UTC m=+0.121717265 container attach 806a0217ac4725b660ae161c8642c97ea8bfc8baff6f4526b29bb90ffa70d307 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=0693142a4093f932157b8019660e85aa608befc8, description=Red Hat OpenStack Platform 17.1 keystone, distribution-scope=public, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, build-date=2025-07-21T13:27:18, com.redhat.component=openstack-keystone-container, io.buildah.version=1.33.12, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1, version=17.1.9, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/agreements, tcib_managed=true, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, io.openshift.expose-services=, release=1, batch=17.1_20250721.1, container_name=container-puppet-keystone, name=rhosp17/openstack-keystone, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-keystone/images/17.1.9-1) Oct 11 09:10:02 np0005481012 podman[66771]: 2025-10-11 09:10:02.800883645 +0000 UTC m=+0.038601995 image pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Oct 11 09:10:02 np0005481012 puppet-user[66496]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:02 np0005481012 puppet-user[66496]: (file & line not available) Oct 11 09:10:03 np0005481012 puppet-user[66514]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:03 np0005481012 puppet-user[66514]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:03 np0005481012 puppet-user[66514]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:03 np0005481012 puppet-user[66514]: (file & line not available) Oct 11 09:10:03 np0005481012 puppet-user[66514]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:03 np0005481012 puppet-user[66514]: (file & line not available) Oct 11 09:10:03 np0005481012 systemd[1]: libpod-1bc986afcd03beae292245f148d96a55b983aa609e11e6929c9cfca5e76dd00c.scope: Deactivated successfully. Oct 11 09:10:03 np0005481012 systemd[1]: libpod-1bc986afcd03beae292245f148d96a55b983aa609e11e6929c9cfca5e76dd00c.scope: Consumed 5.047s CPU time. Oct 11 09:10:03 np0005481012 puppet-user[66496]: Warning: Scope(Class[Heat]): The database_connection parameter is deprecated and will be \ Oct 11 09:10:03 np0005481012 puppet-user[66496]: removed in a future realse. Use heat::db::database_connection instead Oct 11 09:10:03 np0005481012 podman[66967]: 2025-10-11 09:10:03.133451021 +0000 UTC m=+0.031230387 container died 1bc986afcd03beae292245f148d96a55b983aa609e11e6929c9cfca5e76dd00c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, build-date=2025-07-21T15:56:26, release=1, io.buildah.version=1.33.12, summary=Red Hat OpenStack Platform 17.1 heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=50ad31a3907524465c6c121b4205bf5b43d43530, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, container_name=container-puppet-heat_api, com.redhat.component=openstack-heat-api-container, batch=17.1_20250721.1, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, version=17.1.9, config_id=tripleo_puppet_step1, name=rhosp17/openstack-heat-api, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-heat-api/images/17.1.9-1, com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.expose-services=, managed_by=tripleo_ansible, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Oct 11 09:10:03 np0005481012 podman[66967]: 2025-10-11 09:10:03.191573389 +0000 UTC m=+0.089352735 container cleanup 1bc986afcd03beae292245f148d96a55b983aa609e11e6929c9cfca5e76dd00c (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, build-date=2025-07-21T15:56:26, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.33.12, version=17.1.9, summary=Red Hat OpenStack Platform 17.1 heat-api, managed_by=tripleo_ansible, batch=17.1_20250721.1, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-heat-api/images/17.1.9-1, vcs-ref=50ad31a3907524465c6c121b4205bf5b43d43530, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, release=1, container_name=container-puppet-heat_api, name=rhosp17/openstack-heat-api, com.redhat.component=openstack-heat-api-container, architecture=x86_64, vendor=Red Hat, Inc., tcib_managed=true, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/agreements, description=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api) Oct 11 09:10:03 np0005481012 systemd[1]: libpod-conmon-1bc986afcd03beae292245f148d96a55b983aa609e11e6929c9cfca5e76dd00c.scope: Deactivated successfully. Oct 11 09:10:03 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-heat_api --conmon-pidfile /run/container-puppet-heat_api.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini --env NAME=heat_api --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::heat::api#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-heat_api --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-heat_api.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Oct 11 09:10:03 np0005481012 systemd[1]: libpod-691486a5ac592d18cdd7230828f2c1ae0ae3fe94a3f19bb01aeedbed576146b6.scope: Deactivated successfully. Oct 11 09:10:03 np0005481012 systemd[1]: libpod-691486a5ac592d18cdd7230828f2c1ae0ae3fe94a3f19bb01aeedbed576146b6.scope: Consumed 5.168s CPU time. Oct 11 09:10:03 np0005481012 podman[65922]: 2025-10-11 09:10:03.26758737 +0000 UTC m=+5.500415864 container died 691486a5ac592d18cdd7230828f2c1ae0ae3fe94a3f19bb01aeedbed576146b6 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, io.buildah.version=1.33.12, io.openshift.tags=rhosp osp openstack osp-17.1, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, com.redhat.license_terms=https://www.redhat.com/agreements, com.redhat.component=openstack-heat-api-cfn-container, architecture=x86_64, version=17.1.9, release=1, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-type=git, build-date=2025-07-21T14:49:55, vendor=Red Hat, Inc., vcs-ref=4e7292fd77cd8185d9d69d0a3a4974e7b22feb99, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-heat-api-cfn/images/17.1.9-1, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, batch=17.1_20250721.1, managed_by=tripleo_ansible, distribution-scope=public, container_name=container-puppet-heat_api_cfn, tcib_managed=true, name=rhosp17/openstack-heat-api-cfn) Oct 11 09:10:03 np0005481012 podman[67026]: 2025-10-11 09:10:03.337995788 +0000 UTC m=+0.059533882 container cleanup 691486a5ac592d18cdd7230828f2c1ae0ae3fe94a3f19bb01aeedbed576146b6 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, com.redhat.license_terms=https://www.redhat.com/agreements, io.buildah.version=1.33.12, io.openshift.tags=rhosp osp openstack osp-17.1, distribution-scope=public, build-date=2025-07-21T14:49:55, io.openshift.expose-services=, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, version=17.1.9, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-heat_api_cfn, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, com.redhat.component=openstack-heat-api-cfn-container, release=1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, tcib_managed=true, name=rhosp17/openstack-heat-api-cfn, vendor=Red Hat, Inc., architecture=x86_64, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-heat-api-cfn/images/17.1.9-1, batch=17.1_20250721.1, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, vcs-ref=4e7292fd77cd8185d9d69d0a3a4974e7b22feb99) Oct 11 09:10:03 np0005481012 systemd[1]: libpod-conmon-691486a5ac592d18cdd7230828f2c1ae0ae3fe94a3f19bb01aeedbed576146b6.scope: Deactivated successfully. Oct 11 09:10:03 np0005481012 systemd[1]: var-lib-containers-storage-overlay-88f8038253fa807358d18a38c5d693b6434bfb55e0b53a4ff57d39d50e86245d-merged.mount: Deactivated successfully. Oct 11 09:10:03 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-691486a5ac592d18cdd7230828f2c1ae0ae3fe94a3f19bb01aeedbed576146b6-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:03 np0005481012 systemd[1]: var-lib-containers-storage-overlay-be3bd6167f4a275f804f7041d4be1ccce8dda8f684bfb48675b1b31928bd0509-merged.mount: Deactivated successfully. Oct 11 09:10:03 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-1bc986afcd03beae292245f148d96a55b983aa609e11e6929c9cfca5e76dd00c-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:03 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-heat_api_cfn --conmon-pidfile /run/container-puppet-heat_api_cfn.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,heat_config,file,concat,file_line --env NAME=heat_api_cfn --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::heat::api_cfn#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-heat_api_cfn --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-heat_api_cfn.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Oct 11 09:10:03 np0005481012 podman[67084]: 2025-10-11 09:10:03.530255455 +0000 UTC m=+0.072507704 container create 8e37f2a9a81a80e43c64cadb7959f1bed57c252970087ecbc472861fee9af02b (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, batch=17.1_20250721.1, release=1, com.redhat.component=openstack-manila-api-container, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1, config_id=tripleo_puppet_step1, version=17.1.9, summary=Red Hat OpenStack Platform 17.1 manila-api, name=rhosp17/openstack-manila-api, vcs-ref=31c319d283854993bff29633e1e018a905c8b3a8, build-date=2025-07-21T16:06:43, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.expose-services=, vendor=Red Hat, Inc., container_name=container-puppet-manila, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, io.buildah.version=1.33.12, tcib_managed=true, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-manila-api/images/17.1.9-1) Oct 11 09:10:03 np0005481012 systemd[1]: Started libpod-conmon-8e37f2a9a81a80e43c64cadb7959f1bed57c252970087ecbc472861fee9af02b.scope. Oct 11 09:10:03 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:03 np0005481012 puppet-user[66514]: Warning: This parameter is deprecated, please use `internal_proxy`. at ["/etc/puppet/modules/apache/manifests/mod/remoteip.pp", 77]:["/etc/puppet/modules/tripleo/manifests/profile/base/horizon.pp", 103] Oct 11 09:10:03 np0005481012 puppet-user[66514]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Oct 11 09:10:03 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/c0bac2363e145391f734f5563e61fd4829473f6c9287915fb6e7a9d8bc07c62f/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:03 np0005481012 podman[67084]: 2025-10-11 09:10:03.577463555 +0000 UTC m=+0.119715814 container init 8e37f2a9a81a80e43c64cadb7959f1bed57c252970087ecbc472861fee9af02b (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, io.buildah.version=1.33.12, maintainer=OpenStack TripleO Team, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.expose-services=, vendor=Red Hat, Inc., com.redhat.component=openstack-manila-api-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=31c319d283854993bff29633e1e018a905c8b3a8, architecture=x86_64, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-manila-api/images/17.1.9-1, name=rhosp17/openstack-manila-api, vcs-type=git, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 manila-api, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 manila-api, container_name=container-puppet-manila, release=1, build-date=2025-07-21T16:06:43, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1, version=17.1.9, batch=17.1_20250721.1) Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 0.72 seconds Oct 11 09:10:03 np0005481012 podman[67084]: 2025-10-11 09:10:03.585018588 +0000 UTC m=+0.127270827 container start 8e37f2a9a81a80e43c64cadb7959f1bed57c252970087ecbc472861fee9af02b (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, container_name=container-puppet-manila, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, build-date=2025-07-21T16:06:43, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.expose-services=, vendor=Red Hat, Inc., io.buildah.version=1.33.12, maintainer=OpenStack TripleO Team, release=1, com.redhat.component=openstack-manila-api-container, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 manila-api, name=rhosp17/openstack-manila-api, vcs-ref=31c319d283854993bff29633e1e018a905c8b3a8, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, config_id=tripleo_puppet_step1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-manila-api/images/17.1.9-1, version=17.1.9, batch=17.1_20250721.1) Oct 11 09:10:03 np0005481012 podman[67084]: 2025-10-11 09:10:03.58537378 +0000 UTC m=+0.127626049 container attach 8e37f2a9a81a80e43c64cadb7959f1bed57c252970087ecbc472861fee9af02b (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, vcs-ref=31c319d283854993bff29633e1e018a905c8b3a8, release=1, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.tags=rhosp osp openstack osp-17.1, version=17.1.9, vendor=Red Hat, Inc., vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, container_name=container-puppet-manila, maintainer=OpenStack TripleO Team, architecture=x86_64, distribution-scope=public, io.openshift.expose-services=, name=rhosp17/openstack-manila-api, com.redhat.component=openstack-manila-api-container, tcib_managed=true, io.buildah.version=1.33.12, build-date=2025-07-21T16:06:43, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/agreements, summary=Red Hat OpenStack Platform 17.1 manila-api, description=Red Hat OpenStack Platform 17.1 manila-api, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-manila-api/images/17.1.9-1, batch=17.1_20250721.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Oct 11 09:10:03 np0005481012 podman[67084]: 2025-10-11 09:10:03.495237101 +0000 UTC m=+0.037489370 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin_password]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_user_domain_name]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_type]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_url]/ensure: created Oct 11 09:10:03 np0005481012 podman[67157]: 2025-10-11 09:10:03.749637901 +0000 UTC m=+0.085153125 container create e7d84eaafffa0dccc5ef7cf62fb0b91a7720a6e59942b353eaedea5cb178490d (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, distribution-scope=public, maintainer=OpenStack TripleO Team, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-memcached/images/17.1.9-1, name=rhosp17/openstack-memcached, architecture=x86_64, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 memcached, io.buildah.version=1.33.12, container_name=container-puppet-memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, release=1, com.redhat.component=openstack-memcached-container, vendor=Red Hat, Inc., version=17.1.9, batch=17.1_20250721.1, vcs-type=git, managed_by=tripleo_ansible, build-date=2025-07-21T12:58:43, vcs-ref=c5579e43aadfadb0a3c02e9b1c0ac35d1b75fcbe, io.openshift.tags=rhosp osp openstack osp-17.1, io.openshift.expose-services=, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/agreements, description=Red Hat OpenStack Platform 17.1 memcached, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached) Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat/Heat_config[trustee/username]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat/Heat_config[trustee/password]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat/Heat_config[trustee/project_domain_name]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat/Heat_config[trustee/user_domain_name]/ensure: created Oct 11 09:10:03 np0005481012 systemd[1]: Started libpod-conmon-e7d84eaafffa0dccc5ef7cf62fb0b91a7720a6e59942b353eaedea5cb178490d.scope. Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/max_json_body_size]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/region_name_for_services]/ensure: created Oct 11 09:10:03 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:03 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e4a3f05264031a64b318cff90d45ed112a0e7e496c7845ffbbd94d192c2db4bf/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:03 np0005481012 podman[67157]: 2025-10-11 09:10:03.696475296 +0000 UTC m=+0.031990570 image pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Oct 11 09:10:03 np0005481012 podman[67157]: 2025-10-11 09:10:03.799349788 +0000 UTC m=+0.134865012 container init e7d84eaafffa0dccc5ef7cf62fb0b91a7720a6e59942b353eaedea5cb178490d (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, build-date=2025-07-21T12:58:43, vcs-ref=c5579e43aadfadb0a3c02e9b1c0ac35d1b75fcbe, com.redhat.component=openstack-memcached-container, com.redhat.license_terms=https://www.redhat.com/agreements, io.buildah.version=1.33.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-memcached, container_name=container-puppet-memcached, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 memcached, distribution-scope=public, batch=17.1_20250721.1, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1, release=1, description=Red Hat OpenStack Platform 17.1 memcached, io.openshift.expose-services=, version=17.1.9, vcs-type=git, maintainer=OpenStack TripleO Team, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-memcached/images/17.1.9-1) Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat/Heat_config[ec2authtoken/auth_uri]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat/Heat_config[yaql/limit_iterators]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat/Heat_config[yaql/memory_quota]/ensure: created Oct 11 09:10:03 np0005481012 podman[67157]: 2025-10-11 09:10:03.816495049 +0000 UTC m=+0.152010263 container start e7d84eaafffa0dccc5ef7cf62fb0b91a7720a6e59942b353eaedea5cb178490d (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, maintainer=OpenStack TripleO Team, tcib_managed=true, batch=17.1_20250721.1, name=rhosp17/openstack-memcached, managed_by=tripleo_ansible, com.redhat.component=openstack-memcached-container, release=1, description=Red Hat OpenStack Platform 17.1 memcached, distribution-scope=public, version=17.1.9, io.openshift.tags=rhosp osp openstack osp-17.1, build-date=2025-07-21T12:58:43, vendor=Red Hat, Inc., config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, container_name=container-puppet-memcached, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-memcached/images/17.1.9-1, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/agreements, architecture=x86_64, config_id=tripleo_puppet_step1, vcs-ref=c5579e43aadfadb0a3c02e9b1c0ac35d1b75fcbe, io.buildah.version=1.33.12) Oct 11 09:10:03 np0005481012 podman[67157]: 2025-10-11 09:10:03.818722558 +0000 UTC m=+0.154237812 container attach e7d84eaafffa0dccc5ef7cf62fb0b91a7720a6e59942b353eaedea5cb178490d (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1, config_id=tripleo_puppet_step1, build-date=2025-07-21T12:58:43, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 memcached, io.buildah.version=1.33.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, version=17.1.9, release=1, tcib_managed=true, batch=17.1_20250721.1, container_name=container-puppet-memcached, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-ref=c5579e43aadfadb0a3c02e9b1c0ac35d1b75fcbe, distribution-scope=public, managed_by=tripleo_ansible, name=rhosp17/openstack-memcached, vcs-type=git, com.redhat.component=openstack-memcached-container, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-memcached/images/17.1.9-1) Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Cache/Heat_config[resource_finder_cache/caching]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Cron::Purge_deleted/Cron[heat-manage purge_deleted]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66514]: Warning: Scope(Apache::Vhost[horizon_vhost]): Oct 11 09:10:03 np0005481012 puppet-user[66514]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Oct 11 09:10:03 np0005481012 puppet-user[66514]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Oct 11 09:10:03 np0005481012 puppet-user[66514]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Oct 11 09:10:03 np0005481012 puppet-user[66514]: file names. Oct 11 09:10:03 np0005481012 puppet-user[66514]: Oct 11 09:10:03 np0005481012 puppet-user[66514]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Oct 11 09:10:03 np0005481012 puppet-user[66514]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Oct 11 09:10:03 np0005481012 puppet-user[66514]: sanitized $servername parameter when not explicitly defined. Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/auth_encryption_key]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/heat_metadata_server_url]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/heat_waitcondition_server_url]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66514]: Warning: Scope(Apache::Vhost[horizon_ssl_vhost]): Oct 11 09:10:03 np0005481012 puppet-user[66514]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Oct 11 09:10:03 np0005481012 puppet-user[66514]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Oct 11 09:10:03 np0005481012 puppet-user[66514]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Oct 11 09:10:03 np0005481012 puppet-user[66514]: file names. Oct 11 09:10:03 np0005481012 puppet-user[66514]: Oct 11 09:10:03 np0005481012 puppet-user[66514]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Oct 11 09:10:03 np0005481012 puppet-user[66514]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Oct 11 09:10:03 np0005481012 puppet-user[66514]: sanitized $servername parameter when not explicitly defined. Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/trusts_delegated_roles]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/max_resources_per_stack]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/num_engine_workers]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/convergence_engine]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/reauthentication_auth_method]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/max_nested_stack_depth]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/client_retry_limit]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Oct 11 09:10:03 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 1.02 seconds Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/www_authenticate_uri]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_type]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcached_servers]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/region_name]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_url]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/username]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/password]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/user_domain_name]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_name]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_domain_name]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/interface]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66677]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:04 np0005481012 puppet-user[66677]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:04 np0005481012 puppet-user[66677]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:04 np0005481012 puppet-user[66677]: (file & line not available) Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/connection]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66677]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:04 np0005481012 puppet-user[66677]: (file & line not available) Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/max_retries]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Mod::Remoteip/File[remoteip.conf]/ensure: defined content as '{sha256}9c8d4355af8c0547dc87c380e06a19f272a0bd3fac83afce5f8eb116cf574c2e' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Horizon/File[/etc/openstack-dashboard/local_settings.d]/mode: mode changed '0750' to '0755' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Horizon::Wsgi::Apache/File[/var/log/horizon]/mode: mode changed '0750' to '0751' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Horizon::Wsgi::Apache/File[/var/log/horizon/horizon.log]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}751443053f8eb77319d9c761098b6f7bbf2bf0cd179f85af05b002ba8ac0e918' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}4f73037b8196b0bab62c9c1419ef1b40c67b2055f31a8617a1adf8493a295c5b' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/db_max_retries]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Oct 11 09:10:04 np0005481012 puppet-user[66677]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 0.10 seconds Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Mod::Remoteip/Apache::Mod[remoteip]/File[remoteip.load]/ensure: defined content as '{sha256}3977211787f6c6bf5629e4156b32d1dc95c37bc640452d0027b2bc9b1ec9f2d7' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Horizon/Concat[/etc/openstack-dashboard/local_settings]/File[/etc/openstack-dashboard/local_settings]/content: content changed '{sha256}79743e7ac35b48eefd773c622783f4b85fb483cb9697ce173c5af112525ef0c3' to '{sha256}db0e604cc3880f140e116ea67bebbcafa68ac90cafc4e958ff1eb7d9b7bfbcbf' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Horizon::Wsgi::Apache/File[/etc/httpd/conf.d/openstack-dashboard.conf]/content: content changed '{sha256}2674ec0a2b4f3412930e918216e5698d5bc877be4364105136866cad3f2ae4bb' to '{sha256}5c3c01834d94a99528a118d4a02978297ac0bf0250e0729c7e4bbd47d4865680' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Mod::Alias/File[alias.conf]/ensure: defined content as '{sha256}8c17a7de4a27d92b2aca6b156dca9e26b9e0bf31b8cc43f63c971aeed09d4e54' Oct 11 09:10:04 np0005481012 puppet-user[66677]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/Exec[reset-iscsi-initiator-name]/returns: executed successfully Oct 11 09:10:04 np0005481012 puppet-user[66677]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/File[/etc/iscsi/.initiator_reset]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Horizon::Dashboards::Heat/Concat[/etc/openstack-dashboard/local_settings.d/_1699_orchestration_settings.py]/File[/etc/openstack-dashboard/local_settings.d/_1699_orchestration_settings.py]/ensure: defined content as '{sha256}dd44da5c856beb5e53df88fc72180a79669b73c9c04d487b5033290279692113' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Horizon::Dashboards::Manila/Concat[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/File[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/content: content changed '{sha256}30de7bbf440460cde78da0e2cf1cab2404921ef0b0e926f5ebaaf973dc4252c5' to '{sha256}838e0d57b7536ffc538afd2e4d916f26ccb29380c13563d0f1ef51d676112c34' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Horizon::Dashboards::Manila/Concat[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/File[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/group: group changed 'root' to 'apache' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Horizon::Dashboards::Manila/Concat[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/File[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/mode: mode changed '0644' to '0640' Oct 11 09:10:04 np0005481012 puppet-user[66677]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/Exec[sync-iqn-to-host]/returns: executed successfully Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache::Mod::Alias/Apache::Mod[alias]/File[alias.load]/ensure: defined content as '{sha256}824016275330b45fd8bd04b07792de5f9aaa337f8272bfc01c5b57bb515fc9b4' Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Horizon::Wsgi::Apache/Apache::Vhost[horizon_vhost]/Concat[10-horizon_vhost.conf]/File[/etc/httpd/conf.d/10-horizon_vhost.conf]/ensure: defined content as '{sha256}7365c9a059e36e309b808cef0052de872f67cb8daa35c073dee4fbb4305e0ccb' Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/driver]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: /Stage[main]/Horizon::Wsgi::Apache/Apache::Vhost[horizon_ssl_vhost]/Concat[15-horizon_ssl_vhost.conf]/File[/etc/httpd/conf.d/15-horizon_ssl_vhost.conf]/ensure: defined content as '{sha256}0bf29cf7874f698f0f314206be33262d00c4e3e1f9f7a6273c5aa42f6460adfc' Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/transport_url]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/rpc_response_timeout]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66514]: Notice: Applied catalog in 0.29 seconds Oct 11 09:10:04 np0005481012 puppet-user[66514]: Application: Oct 11 09:10:04 np0005481012 puppet-user[66514]: Initial environment: production Oct 11 09:10:04 np0005481012 puppet-user[66514]: Converged environment: production Oct 11 09:10:04 np0005481012 puppet-user[66514]: Run mode: user Oct 11 09:10:04 np0005481012 puppet-user[66514]: Changes: Oct 11 09:10:04 np0005481012 puppet-user[66514]: Total: 50 Oct 11 09:10:04 np0005481012 puppet-user[66514]: Events: Oct 11 09:10:04 np0005481012 puppet-user[66514]: Success: 50 Oct 11 09:10:04 np0005481012 puppet-user[66514]: Total: 50 Oct 11 09:10:04 np0005481012 puppet-user[66514]: Resources: Oct 11 09:10:04 np0005481012 puppet-user[66514]: Skipped: 33 Oct 11 09:10:04 np0005481012 puppet-user[66514]: Changed: 48 Oct 11 09:10:04 np0005481012 puppet-user[66514]: Out of sync: 48 Oct 11 09:10:04 np0005481012 puppet-user[66514]: Total: 140 Oct 11 09:10:04 np0005481012 puppet-user[66514]: Time: Oct 11 09:10:04 np0005481012 puppet-user[66514]: Concat file: 0.00 Oct 11 09:10:04 np0005481012 puppet-user[66514]: Concat fragment: 0.00 Oct 11 09:10:04 np0005481012 puppet-user[66514]: File: 0.12 Oct 11 09:10:04 np0005481012 puppet-user[66514]: Transaction evaluation: 0.28 Oct 11 09:10:04 np0005481012 puppet-user[66514]: Catalog application: 0.29 Oct 11 09:10:04 np0005481012 puppet-user[66514]: Config retrieval: 1.10 Oct 11 09:10:04 np0005481012 puppet-user[66514]: Last run: 1760173804 Oct 11 09:10:04 np0005481012 puppet-user[66514]: Total: 0.29 Oct 11 09:10:04 np0005481012 puppet-user[66514]: Version: Oct 11 09:10:04 np0005481012 puppet-user[66514]: Config: 1760173803 Oct 11 09:10:04 np0005481012 puppet-user[66514]: Puppet: 7.10.0 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/transport_url]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat/Oslo::Middleware[heat_config]/Heat_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/expose_headers]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/max_age]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/allow_headers]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/debug]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/log_dir]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/backend]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/enabled]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/memcache_servers]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/tls_enabled]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: /Stage[main]/Heat::Policy/Oslo::Policy[heat_config]/Heat_config[oslo_policy/policy_file]/ensure: created Oct 11 09:10:04 np0005481012 puppet-user[66496]: Notice: Applied catalog in 1.03 seconds Oct 11 09:10:04 np0005481012 puppet-user[66496]: Application: Oct 11 09:10:04 np0005481012 puppet-user[66496]: Initial environment: production Oct 11 09:10:04 np0005481012 puppet-user[66496]: Converged environment: production Oct 11 09:10:04 np0005481012 puppet-user[66496]: Run mode: user Oct 11 09:10:04 np0005481012 puppet-user[66496]: Changes: Oct 11 09:10:04 np0005481012 puppet-user[66496]: Total: 61 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Events: Oct 11 09:10:04 np0005481012 puppet-user[66496]: Success: 61 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Total: 61 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Resources: Oct 11 09:10:04 np0005481012 puppet-user[66496]: Skipped: 21 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Changed: 61 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Out of sync: 61 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Total: 259 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Time: Oct 11 09:10:04 np0005481012 puppet-user[66496]: Anchor: 0.00 Oct 11 09:10:04 np0005481012 puppet-user[66496]: File: 0.00 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Cron: 0.01 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Augeas: 0.02 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Package: 0.02 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Config retrieval: 0.82 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Heat config: 0.86 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Transaction evaluation: 1.01 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Catalog application: 1.03 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Last run: 1760173804 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Resources: 0.00 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Total: 1.03 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Version: Oct 11 09:10:04 np0005481012 puppet-user[66496]: Config: 1760173802 Oct 11 09:10:04 np0005481012 puppet-user[66496]: Puppet: 7.10.0 Oct 11 09:10:04 np0005481012 puppet-user[66677]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/Augeas[chap_algs in /etc/iscsi/iscsid.conf]/returns: executed successfully Oct 11 09:10:04 np0005481012 puppet-user[66677]: Notice: Applied catalog in 0.49 seconds Oct 11 09:10:04 np0005481012 puppet-user[66677]: Application: Oct 11 09:10:04 np0005481012 puppet-user[66677]: Initial environment: production Oct 11 09:10:04 np0005481012 puppet-user[66677]: Converged environment: production Oct 11 09:10:04 np0005481012 puppet-user[66677]: Run mode: user Oct 11 09:10:04 np0005481012 puppet-user[66677]: Changes: Oct 11 09:10:04 np0005481012 puppet-user[66677]: Total: 4 Oct 11 09:10:04 np0005481012 puppet-user[66677]: Events: Oct 11 09:10:04 np0005481012 puppet-user[66677]: Success: 4 Oct 11 09:10:04 np0005481012 puppet-user[66677]: Total: 4 Oct 11 09:10:04 np0005481012 puppet-user[66677]: Resources: Oct 11 09:10:04 np0005481012 puppet-user[66677]: Changed: 4 Oct 11 09:10:04 np0005481012 puppet-user[66677]: Out of sync: 4 Oct 11 09:10:04 np0005481012 puppet-user[66677]: Skipped: 8 Oct 11 09:10:04 np0005481012 puppet-user[66677]: Total: 13 Oct 11 09:10:04 np0005481012 puppet-user[66677]: Time: Oct 11 09:10:04 np0005481012 puppet-user[66677]: File: 0.00 Oct 11 09:10:04 np0005481012 puppet-user[66677]: Exec: 0.07 Oct 11 09:10:04 np0005481012 puppet-user[66677]: Config retrieval: 0.13 Oct 11 09:10:04 np0005481012 puppet-user[66677]: Augeas: 0.40 Oct 11 09:10:04 np0005481012 puppet-user[66677]: Transaction evaluation: 0.49 Oct 11 09:10:04 np0005481012 puppet-user[66677]: Catalog application: 0.49 Oct 11 09:10:04 np0005481012 puppet-user[66677]: Last run: 1760173804 Oct 11 09:10:04 np0005481012 puppet-user[66677]: Total: 0.49 Oct 11 09:10:04 np0005481012 puppet-user[66677]: Version: Oct 11 09:10:04 np0005481012 puppet-user[66677]: Config: 1760173804 Oct 11 09:10:04 np0005481012 puppet-user[66677]: Puppet: 7.10.0 Oct 11 09:10:04 np0005481012 puppet-user[66876]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:04 np0005481012 puppet-user[66876]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:04 np0005481012 puppet-user[66876]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:04 np0005481012 puppet-user[66876]: (file & line not available) Oct 11 09:10:04 np0005481012 systemd[1]: libpod-3df4991805ed6e05417ede6974f19ed8892e0618bdc423a1c7abec0f92930e1e.scope: Deactivated successfully. Oct 11 09:10:04 np0005481012 systemd[1]: libpod-3df4991805ed6e05417ede6974f19ed8892e0618bdc423a1c7abec0f92930e1e.scope: Consumed 3.497s CPU time. Oct 11 09:10:04 np0005481012 podman[66466]: 2025-10-11 09:10:04.852099321 +0000 UTC m=+3.969019087 container died 3df4991805ed6e05417ede6974f19ed8892e0618bdc423a1c7abec0f92930e1e (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, summary=Red Hat OpenStack Platform 17.1 horizon, vcs-ref=ad1f6dbe9b4f6499ef64ed90ffb3ceeed90078a5, maintainer=OpenStack TripleO Team, batch=17.1_20250721.1, com.redhat.component=openstack-horizon-container, build-date=2025-07-21T13:58:15, name=rhosp17/openstack-horizon, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, distribution-scope=public, container_name=container-puppet-horizon, description=Red Hat OpenStack Platform 17.1 horizon, vcs-type=git, tcib_managed=true, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-horizon/images/17.1.9-1, release=1, version=17.1.9, config_id=tripleo_puppet_step1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/agreements, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, io.openshift.tags=rhosp osp openstack osp-17.1, io.openshift.expose-services=, vendor=Red Hat, Inc., managed_by=tripleo_ansible, architecture=x86_64, io.buildah.version=1.33.12) Oct 11 09:10:04 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-3df4991805ed6e05417ede6974f19ed8892e0618bdc423a1c7abec0f92930e1e-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:04 np0005481012 systemd[1]: var-lib-containers-storage-overlay-85a37bd40e4cab6ca1e59662a7abd1f93b1625e064406a99f4cc47e3793c2281-merged.mount: Deactivated successfully. Oct 11 09:10:04 np0005481012 podman[67381]: 2025-10-11 09:10:04.970837444 +0000 UTC m=+0.111851891 container cleanup 3df4991805ed6e05417ede6974f19ed8892e0618bdc423a1c7abec0f92930e1e (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, architecture=x86_64, config_id=tripleo_puppet_step1, io.openshift.expose-services=, version=17.1.9, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 horizon, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-horizon/images/17.1.9-1, vcs-type=git, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, managed_by=tripleo_ansible, com.redhat.component=openstack-horizon-container, io.openshift.tags=rhosp osp openstack osp-17.1, tcib_managed=true, batch=17.1_20250721.1, description=Red Hat OpenStack Platform 17.1 horizon, io.buildah.version=1.33.12, com.redhat.license_terms=https://www.redhat.com/agreements, build-date=2025-07-21T13:58:15, name=rhosp17/openstack-horizon, container_name=container-puppet-horizon, distribution-scope=public, release=1, vcs-ref=ad1f6dbe9b4f6499ef64ed90ffb3ceeed90078a5) Oct 11 09:10:04 np0005481012 puppet-user[66876]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:04 np0005481012 puppet-user[66876]: (file & line not available) Oct 11 09:10:04 np0005481012 systemd[1]: libpod-conmon-3df4991805ed6e05417ede6974f19ed8892e0618bdc423a1c7abec0f92930e1e.scope: Deactivated successfully. Oct 11 09:10:04 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-horizon --conmon-pidfile /run/container-puppet-horizon.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,horizon_config --env NAME=horizon --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::horizon#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-horizon --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-horizon.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Oct 11 09:10:05 np0005481012 systemd[1]: libpod-d16624541ba8246aa2e3804fdd52142a8a37f296214d247abbfc829bbc2cd529.scope: Deactivated successfully. Oct 11 09:10:05 np0005481012 systemd[1]: libpod-d16624541ba8246aa2e3804fdd52142a8a37f296214d247abbfc829bbc2cd529.scope: Consumed 2.591s CPU time. Oct 11 09:10:05 np0005481012 podman[66627]: 2025-10-11 09:10:05.073691785 +0000 UTC m=+2.922497646 container died d16624541ba8246aa2e3804fdd52142a8a37f296214d247abbfc829bbc2cd529 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, name=rhosp17/openstack-iscsid, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, config_id=tripleo_puppet_step1, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-07-21T13:27:15, vcs-type=git, vendor=Red Hat, Inc., batch=17.1_20250721.1, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, release=1, architecture=x86_64, com.redhat.component=openstack-iscsid-container, description=Red Hat OpenStack Platform 17.1 iscsid, managed_by=tripleo_ansible, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-iscsid/images/17.1.9-1, com.redhat.license_terms=https://www.redhat.com/agreements, summary=Red Hat OpenStack Platform 17.1 iscsid, version=17.1.9, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1, container_name=container-puppet-iscsid, io.buildah.version=1.33.12, vcs-ref=92ba14eeb90bb45ac0dcf02b7ce60e274a5ccbb2) Oct 11 09:10:05 np0005481012 podman[67502]: 2025-10-11 09:10:05.17537586 +0000 UTC m=+0.094000168 container cleanup d16624541ba8246aa2e3804fdd52142a8a37f296214d247abbfc829bbc2cd529 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-ref=92ba14eeb90bb45ac0dcf02b7ce60e274a5ccbb2, io.buildah.version=1.33.12, tcib_managed=true, config_id=tripleo_puppet_step1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-iscsid/images/17.1.9-1, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, batch=17.1_20250721.1, vendor=Red Hat, Inc., managed_by=tripleo_ansible, container_name=container-puppet-iscsid, vcs-type=git, version=17.1.9, distribution-scope=public, architecture=x86_64, build-date=2025-07-21T13:27:15, name=rhosp17/openstack-iscsid, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, release=1, com.redhat.component=openstack-iscsid-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1, description=Red Hat OpenStack Platform 17.1 iscsid) Oct 11 09:10:05 np0005481012 systemd[1]: libpod-conmon-d16624541ba8246aa2e3804fdd52142a8a37f296214d247abbfc829bbc2cd529.scope: Deactivated successfully. Oct 11 09:10:05 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-iscsid --conmon-pidfile /run/container-puppet-iscsid.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,iscsid_config --env NAME=iscsid --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::iscsid#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-iscsid --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-iscsid.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/iscsi:/tmp/iscsi.host:z --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Oct 11 09:10:05 np0005481012 systemd[1]: libpod-03e2fbd670d6a653a2191b9a3cc34282cdbf3f99150abebcbdc96b598ca86be4.scope: Deactivated successfully. Oct 11 09:10:05 np0005481012 systemd[1]: libpod-03e2fbd670d6a653a2191b9a3cc34282cdbf3f99150abebcbdc96b598ca86be4.scope: Consumed 4.094s CPU time. Oct 11 09:10:05 np0005481012 puppet-user[66876]: Notice: Accepting previously invalid value for target type 'Enum['sql', 'template']' Oct 11 09:10:05 np0005481012 puppet-user[66876]: Warning: Scope(Class[Keystone]): The database_connection parameter is deprecated and will be \ Oct 11 09:10:05 np0005481012 puppet-user[66876]: removed in a future realse. Use keystone::db::database_connection instead Oct 11 09:10:05 np0005481012 podman[66446]: 2025-10-11 09:10:05.274022811 +0000 UTC m=+4.423798503 container died 03e2fbd670d6a653a2191b9a3cc34282cdbf3f99150abebcbdc96b598ca86be4 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, version=17.1.9, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, io.openshift.expose-services=, vendor=Red Hat, Inc., architecture=x86_64, io.buildah.version=1.33.12, com.redhat.license_terms=https://www.redhat.com/agreements, tcib_managed=true, container_name=container-puppet-heat, build-date=2025-07-21T15:56:26, managed_by=tripleo_ansible, vcs-ref=50ad31a3907524465c6c121b4205bf5b43d43530, summary=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.component=openstack-heat-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20250721.1, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, release=1, io.openshift.tags=rhosp osp openstack osp-17.1, name=rhosp17/openstack-heat-api, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-heat-api/images/17.1.9-1, maintainer=OpenStack TripleO Team, vcs-type=git, description=Red Hat OpenStack Platform 17.1 heat-api) Oct 11 09:10:05 np0005481012 podman[67585]: 2025-10-11 09:10:05.306891308 +0000 UTC m=+0.053376362 container create 93a2d5a502a684d4f2e3cfdcddecd57e3e7d2bf208993a4a945f20d3c1375ebc (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, container_name=container-puppet-metrics_qdr, maintainer=OpenStack TripleO Team, tcib_managed=true, name=rhosp17/openstack-qdrouterd, config_id=tripleo_puppet_step1, build-date=2025-07-21T13:07:59, io.buildah.version=1.33.12, batch=17.1_20250721.1, managed_by=tripleo_ansible, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-ref=4a9cf7084a7631a8cf28014f76f8f9d6da5b1fed, release=1, vendor=Red Hat, Inc., version=17.1.9, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-qdrouterd/images/17.1.9-1, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1, com.redhat.component=openstack-qdrouterd-container, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=) Oct 11 09:10:05 np0005481012 podman[67608]: 2025-10-11 09:10:05.333483701 +0000 UTC m=+0.050650307 container cleanup 03e2fbd670d6a653a2191b9a3cc34282cdbf3f99150abebcbdc96b598ca86be4 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, tcib_managed=true, batch=17.1_20250721.1, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-heat-api-container, config_id=tripleo_puppet_step1, name=rhosp17/openstack-heat-api, vcs-type=git, vendor=Red Hat, Inc., io.openshift.expose-services=, build-date=2025-07-21T15:56:26, com.redhat.license_terms=https://www.redhat.com/agreements, container_name=container-puppet-heat, description=Red Hat OpenStack Platform 17.1 heat-api, release=1, distribution-scope=public, io.buildah.version=1.33.12, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-heat-api/images/17.1.9-1, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=50ad31a3907524465c6c121b4205bf5b43d43530, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, version=17.1.9) Oct 11 09:10:05 np0005481012 systemd[1]: Started libpod-conmon-93a2d5a502a684d4f2e3cfdcddecd57e3e7d2bf208993a4a945f20d3c1375ebc.scope. Oct 11 09:10:05 np0005481012 systemd[1]: libpod-conmon-03e2fbd670d6a653a2191b9a3cc34282cdbf3f99150abebcbdc96b598ca86be4.scope: Deactivated successfully. Oct 11 09:10:05 np0005481012 systemd[1]: var-lib-containers-storage-overlay-a772346e75ccf3595696b0b49ce539c58ebd87960b0634b812c2c932db3c3069-merged.mount: Deactivated successfully. Oct 11 09:10:05 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-d16624541ba8246aa2e3804fdd52142a8a37f296214d247abbfc829bbc2cd529-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:05 np0005481012 systemd[1]: var-lib-containers-storage-overlay-7ebca2346a49e5abf47e7a1c5da00f62608945f0ac178a8166721f99f1220cf5-merged.mount: Deactivated successfully. Oct 11 09:10:05 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-03e2fbd670d6a653a2191b9a3cc34282cdbf3f99150abebcbdc96b598ca86be4-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:05 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-heat --conmon-pidfile /run/container-puppet-heat.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,heat_config,file,concat,file_line --env NAME=heat --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::heat::engine#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-heat --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-heat.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Oct 11 09:10:05 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:05 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/772631badb6adb334788fa3d81ae0d4e228ff18a34bbad9b839f7614eedf92ff/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:05 np0005481012 podman[67585]: 2025-10-11 09:10:05.367870344 +0000 UTC m=+0.114355398 container init 93a2d5a502a684d4f2e3cfdcddecd57e3e7d2bf208993a4a945f20d3c1375ebc (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, release=1, config_id=tripleo_puppet_step1, vcs-type=git, container_name=container-puppet-metrics_qdr, version=17.1.9, io.openshift.tags=rhosp osp openstack osp-17.1, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/agreements, name=rhosp17/openstack-qdrouterd, vcs-ref=4a9cf7084a7631a8cf28014f76f8f9d6da5b1fed, io.buildah.version=1.33.12, io.openshift.expose-services=, managed_by=tripleo_ansible, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-qdrouterd/images/17.1.9-1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, com.redhat.component=openstack-qdrouterd-container, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20250721.1, architecture=x86_64, build-date=2025-07-21T13:07:59) Oct 11 09:10:05 np0005481012 systemd[1]: tmp-crun.TwNz0U.mount: Deactivated successfully. Oct 11 09:10:05 np0005481012 podman[67585]: 2025-10-11 09:10:05.283771093 +0000 UTC m=+0.030256147 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Oct 11 09:10:05 np0005481012 podman[67585]: 2025-10-11 09:10:05.388032458 +0000 UTC m=+0.134517512 container start 93a2d5a502a684d4f2e3cfdcddecd57e3e7d2bf208993a4a945f20d3c1375ebc (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=4a9cf7084a7631a8cf28014f76f8f9d6da5b1fed, io.openshift.tags=rhosp osp openstack osp-17.1, name=rhosp17/openstack-qdrouterd, maintainer=OpenStack TripleO Team, build-date=2025-07-21T13:07:59, io.buildah.version=1.33.12, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=container-puppet-metrics_qdr, version=17.1.9, description=Red Hat OpenStack Platform 17.1 qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, vcs-type=git, com.redhat.component=openstack-qdrouterd-container, release=1, batch=17.1_20250721.1, tcib_managed=true, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-qdrouterd/images/17.1.9-1, com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.expose-services=, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_puppet_step1) Oct 11 09:10:05 np0005481012 podman[67585]: 2025-10-11 09:10:05.388296156 +0000 UTC m=+0.134781200 container attach 93a2d5a502a684d4f2e3cfdcddecd57e3e7d2bf208993a4a945f20d3c1375ebc (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1, maintainer=OpenStack TripleO Team, batch=17.1_20250721.1, name=rhosp17/openstack-qdrouterd, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2025-07-21T13:07:59, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., version=17.1.9, vcs-type=git, io.openshift.expose-services=, tcib_managed=true, managed_by=tripleo_ansible, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-qdrouterd/images/17.1.9-1, config_id=tripleo_puppet_step1, io.buildah.version=1.33.12, description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, release=1, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/agreements, container_name=container-puppet-metrics_qdr, vcs-ref=4a9cf7084a7631a8cf28014f76f8f9d6da5b1fed) Oct 11 09:10:05 np0005481012 puppet-user[67156]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:05 np0005481012 puppet-user[67156]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:05 np0005481012 puppet-user[67156]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:05 np0005481012 puppet-user[67156]: (file & line not available) Oct 11 09:10:05 np0005481012 puppet-user[67156]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:05 np0005481012 puppet-user[67156]: (file & line not available) Oct 11 09:10:05 np0005481012 podman[67762]: 2025-10-11 09:10:05.55299428 +0000 UTC m=+0.056670093 container create c9b97ee4b7a578b21ed9512499f6c69aee98fb54abc6ca06e1f05985e0a8addf (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, maintainer=OpenStack TripleO Team, release=1, architecture=x86_64, managed_by=tripleo_ansible, com.redhat.component=openstack-mariadb-container, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1, name=rhosp17/openstack-mariadb, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.9, batch=17.1_20250721.1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.33.12, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, container_name=container-puppet-mysql, distribution-scope=public, build-date=2025-07-21T12:58:45) Oct 11 09:10:05 np0005481012 puppet-user[67188]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:05 np0005481012 puppet-user[67188]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:05 np0005481012 puppet-user[67188]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:05 np0005481012 puppet-user[67188]: (file & line not available) Oct 11 09:10:05 np0005481012 systemd[1]: Started libpod-conmon-c9b97ee4b7a578b21ed9512499f6c69aee98fb54abc6ca06e1f05985e0a8addf.scope. Oct 11 09:10:05 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:05 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/7f247345f76ad368705853ca1f97c94d0caf917562e17fcbd0b1f3b01c5ba444/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:05 np0005481012 puppet-user[67188]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:05 np0005481012 puppet-user[67188]: (file & line not available) Oct 11 09:10:05 np0005481012 podman[67762]: 2025-10-11 09:10:05.596641591 +0000 UTC m=+0.100317424 container init c9b97ee4b7a578b21ed9512499f6c69aee98fb54abc6ca06e1f05985e0a8addf (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, io.buildah.version=1.33.12, com.redhat.license_terms=https://www.redhat.com/agreements, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, build-date=2025-07-21T12:58:45, version=17.1.9, vendor=Red Hat, Inc., io.openshift.expose-services=, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1, description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp17/openstack-mariadb, container_name=container-puppet-mysql, com.redhat.component=openstack-mariadb-container, summary=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20250721.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, tcib_managed=true, config_id=tripleo_puppet_step1, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, managed_by=tripleo_ansible, distribution-scope=public, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, release=1) Oct 11 09:10:05 np0005481012 podman[67762]: 2025-10-11 09:10:05.608804667 +0000 UTC m=+0.112480500 container start c9b97ee4b7a578b21ed9512499f6c69aee98fb54abc6ca06e1f05985e0a8addf (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1, name=rhosp17/openstack-mariadb, container_name=container-puppet-mysql, com.redhat.component=openstack-mariadb-container, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, com.redhat.license_terms=https://www.redhat.com/agreements, description=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, vendor=Red Hat, Inc., version=17.1.9, io.buildah.version=1.33.12, summary=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20250721.1, tcib_managed=true, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_puppet_step1, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, release=1, build-date=2025-07-21T12:58:45) Oct 11 09:10:05 np0005481012 podman[67762]: 2025-10-11 09:10:05.608992343 +0000 UTC m=+0.112668176 container attach c9b97ee4b7a578b21ed9512499f6c69aee98fb54abc6ca06e1f05985e0a8addf (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, io.openshift.expose-services=, io.buildah.version=1.33.12, summary=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, release=1, build-date=2025-07-21T12:58:45, description=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, tcib_managed=true, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, batch=17.1_20250721.1, io.openshift.tags=rhosp osp openstack osp-17.1, container_name=container-puppet-mysql, managed_by=tripleo_ansible, com.redhat.component=openstack-mariadb-container, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/agreements, name=rhosp17/openstack-mariadb, architecture=x86_64, version=17.1.9) Oct 11 09:10:05 np0005481012 puppet-user[67156]: Warning: Scope(Class[Manila]): The sql_connection parameter is deprecated and will be \ Oct 11 09:10:05 np0005481012 puppet-user[67156]: removed in a future realse. Use manila::db::database_connection instead Oct 11 09:10:05 np0005481012 puppet-user[67188]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 0.07 seconds Oct 11 09:10:05 np0005481012 podman[67762]: 2025-10-11 09:10:05.528442211 +0000 UTC m=+0.032118034 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Oct 11 09:10:05 np0005481012 puppet-user[67188]: Notice: /Stage[main]/Memcached/File[/etc/sysconfig/memcached]/content: content changed '{sha256}31f7d20fad86bdd2bc5692619928af8785dc0e9f858863aeece67cff0e4edfd2' to '{sha256}1683d2179da2d1034e6baa7aa85c57f61b07baad50072db79ecd8cb5b32f5ebb' Oct 11 09:10:05 np0005481012 puppet-user[67188]: Notice: Applied catalog in 0.01 seconds Oct 11 09:10:05 np0005481012 puppet-user[67188]: Application: Oct 11 09:10:05 np0005481012 puppet-user[67188]: Initial environment: production Oct 11 09:10:05 np0005481012 puppet-user[67188]: Converged environment: production Oct 11 09:10:05 np0005481012 puppet-user[67188]: Run mode: user Oct 11 09:10:05 np0005481012 puppet-user[67188]: Changes: Oct 11 09:10:05 np0005481012 puppet-user[67188]: Total: 1 Oct 11 09:10:05 np0005481012 puppet-user[67188]: Events: Oct 11 09:10:05 np0005481012 puppet-user[67188]: Success: 1 Oct 11 09:10:05 np0005481012 puppet-user[67188]: Total: 1 Oct 11 09:10:05 np0005481012 puppet-user[67188]: Resources: Oct 11 09:10:05 np0005481012 puppet-user[67188]: Changed: 1 Oct 11 09:10:05 np0005481012 puppet-user[67188]: Out of sync: 1 Oct 11 09:10:05 np0005481012 puppet-user[67188]: Skipped: 9 Oct 11 09:10:05 np0005481012 puppet-user[67188]: Total: 10 Oct 11 09:10:05 np0005481012 puppet-user[67188]: Time: Oct 11 09:10:05 np0005481012 puppet-user[67188]: File: 0.00 Oct 11 09:10:05 np0005481012 puppet-user[67188]: Transaction evaluation: 0.01 Oct 11 09:10:05 np0005481012 puppet-user[67188]: Catalog application: 0.01 Oct 11 09:10:05 np0005481012 puppet-user[67188]: Config retrieval: 0.11 Oct 11 09:10:05 np0005481012 puppet-user[67188]: Last run: 1760173805 Oct 11 09:10:05 np0005481012 puppet-user[67188]: Total: 0.01 Oct 11 09:10:05 np0005481012 puppet-user[67188]: Version: Oct 11 09:10:05 np0005481012 puppet-user[67188]: Config: 1760173805 Oct 11 09:10:05 np0005481012 puppet-user[67188]: Puppet: 7.10.0 Oct 11 09:10:05 np0005481012 podman[67860]: 2025-10-11 09:10:05.696688095 +0000 UTC m=+0.066543690 container create 668776c563e1f3774bfd81afbb61bd39612ba3d87113b5493e5ebe92faec8bbf (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, tcib_managed=true, maintainer=OpenStack TripleO Team, version=17.1.9, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-neutron-server/images/17.1.9-1, container_name=container-puppet-neutron, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/agreements, description=Red Hat OpenStack Platform 17.1 neutron-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, managed_by=tripleo_ansible, com.redhat.component=openstack-neutron-server-container, vcs-type=git, release=1, build-date=2025-07-21T15:44:03, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, io.buildah.version=1.33.12, batch=17.1_20250721.1, name=rhosp17/openstack-neutron-server, vcs-ref=a2a5d3babd6b02c0b20df6d01cd606fef9bdf69d, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.tags=rhosp osp openstack osp-17.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc.) Oct 11 09:10:05 np0005481012 systemd[1]: Started libpod-conmon-668776c563e1f3774bfd81afbb61bd39612ba3d87113b5493e5ebe92faec8bbf.scope. Oct 11 09:10:05 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:05 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/8b714ffcf836fb0ab9468ef016e95a2ffb5d4bf9c72ce776dfa28e0b49cfe5e1/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:05 np0005481012 podman[67860]: 2025-10-11 09:10:05.735898778 +0000 UTC m=+0.105754383 container init 668776c563e1f3774bfd81afbb61bd39612ba3d87113b5493e5ebe92faec8bbf (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, description=Red Hat OpenStack Platform 17.1 neutron-server, container_name=container-puppet-neutron, io.buildah.version=1.33.12, batch=17.1_20250721.1, vendor=Red Hat, Inc., io.openshift.expose-services=, managed_by=tripleo_ansible, release=1, summary=Red Hat OpenStack Platform 17.1 neutron-server, tcib_managed=true, com.redhat.component=openstack-neutron-server-container, vcs-ref=a2a5d3babd6b02c0b20df6d01cd606fef9bdf69d, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, config_id=tripleo_puppet_step1, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-neutron-server/images/17.1.9-1, build-date=2025-07-21T15:44:03, architecture=x86_64, maintainer=OpenStack TripleO Team, version=17.1.9, name=rhosp17/openstack-neutron-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server) Oct 11 09:10:05 np0005481012 podman[67860]: 2025-10-11 09:10:05.749992463 +0000 UTC m=+0.119848048 container start 668776c563e1f3774bfd81afbb61bd39612ba3d87113b5493e5ebe92faec8bbf (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, tcib_managed=true, name=rhosp17/openstack-neutron-server, com.redhat.component=openstack-neutron-server-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, architecture=x86_64, vcs-type=git, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20250721.1, vcs-ref=a2a5d3babd6b02c0b20df6d01cd606fef9bdf69d, io.openshift.expose-services=, release=1, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, config_id=tripleo_puppet_step1, container_name=container-puppet-neutron, com.redhat.license_terms=https://www.redhat.com/agreements, build-date=2025-07-21T15:44:03, description=Red Hat OpenStack Platform 17.1 neutron-server, io.buildah.version=1.33.12, summary=Red Hat OpenStack Platform 17.1 neutron-server, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-neutron-server/images/17.1.9-1, io.openshift.tags=rhosp osp openstack osp-17.1, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, version=17.1.9, distribution-scope=public) Oct 11 09:10:05 np0005481012 podman[67860]: 2025-10-11 09:10:05.750315403 +0000 UTC m=+0.120171028 container attach 668776c563e1f3774bfd81afbb61bd39612ba3d87113b5493e5ebe92faec8bbf (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, version=17.1.9, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-type=git, io.buildah.version=1.33.12, tcib_managed=true, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, vendor=Red Hat, Inc., batch=17.1_20250721.1, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 neutron-server, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-neutron-server/images/17.1.9-1, description=Red Hat OpenStack Platform 17.1 neutron-server, architecture=x86_64, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-neutron-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-07-21T15:44:03, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, distribution-scope=public, container_name=container-puppet-neutron, vcs-ref=a2a5d3babd6b02c0b20df6d01cd606fef9bdf69d, io.openshift.expose-services=, com.redhat.component=openstack-neutron-server-container, io.openshift.tags=rhosp osp openstack osp-17.1, release=1) Oct 11 09:10:05 np0005481012 podman[67860]: 2025-10-11 09:10:05.659761833 +0000 UTC m=+0.029617448 image pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Oct 11 09:10:05 np0005481012 systemd[1]: libpod-e7d84eaafffa0dccc5ef7cf62fb0b91a7720a6e59942b353eaedea5cb178490d.scope: Deactivated successfully. Oct 11 09:10:05 np0005481012 systemd[1]: libpod-e7d84eaafffa0dccc5ef7cf62fb0b91a7720a6e59942b353eaedea5cb178490d.scope: Consumed 2.006s CPU time. Oct 11 09:10:05 np0005481012 podman[67157]: 2025-10-11 09:10:05.9454778 +0000 UTC m=+2.280993024 container died e7d84eaafffa0dccc5ef7cf62fb0b91a7720a6e59942b353eaedea5cb178490d (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, vcs-type=git, container_name=container-puppet-memcached, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, com.redhat.component=openstack-memcached-container, io.openshift.tags=rhosp osp openstack osp-17.1, release=1, vendor=Red Hat, Inc., tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, version=17.1.9, architecture=x86_64, build-date=2025-07-21T12:58:43, vcs-ref=c5579e43aadfadb0a3c02e9b1c0ac35d1b75fcbe, io.openshift.expose-services=, distribution-scope=public, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-memcached/images/17.1.9-1, name=rhosp17/openstack-memcached, com.redhat.license_terms=https://www.redhat.com/agreements, summary=Red Hat OpenStack Platform 17.1 memcached, io.buildah.version=1.33.12, description=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20250721.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible) Oct 11 09:10:06 np0005481012 podman[67931]: 2025-10-11 09:10:06.034639488 +0000 UTC m=+0.077079115 container cleanup e7d84eaafffa0dccc5ef7cf62fb0b91a7720a6e59942b353eaedea5cb178490d (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, build-date=2025-07-21T12:58:43, config_id=tripleo_puppet_step1, release=1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-memcached/images/17.1.9-1, summary=Red Hat OpenStack Platform 17.1 memcached, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., name=rhosp17/openstack-memcached, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, version=17.1.9, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.expose-services=, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20250721.1, distribution-scope=public, vcs-ref=c5579e43aadfadb0a3c02e9b1c0ac35d1b75fcbe, io.buildah.version=1.33.12, com.redhat.component=openstack-memcached-container, managed_by=tripleo_ansible, container_name=container-puppet-memcached, io.openshift.tags=rhosp osp openstack osp-17.1, maintainer=OpenStack TripleO Team) Oct 11 09:10:06 np0005481012 systemd[1]: libpod-conmon-e7d84eaafffa0dccc5ef7cf62fb0b91a7720a6e59942b353eaedea5cb178490d.scope: Deactivated successfully. Oct 11 09:10:06 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-memcached --conmon-pidfile /run/container-puppet-memcached.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file --env NAME=memcached --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::memcached#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-memcached --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-memcached.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Oct 11 09:10:06 np0005481012 puppet-user[66876]: Warning: Scope(Apache::Vhost[keystone_wsgi]): Oct 11 09:10:06 np0005481012 puppet-user[66876]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Oct 11 09:10:06 np0005481012 puppet-user[66876]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Oct 11 09:10:06 np0005481012 puppet-user[66876]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Oct 11 09:10:06 np0005481012 puppet-user[66876]: file names. Oct 11 09:10:06 np0005481012 puppet-user[66876]: Oct 11 09:10:06 np0005481012 puppet-user[66876]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Oct 11 09:10:06 np0005481012 puppet-user[66876]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Oct 11 09:10:06 np0005481012 puppet-user[66876]: sanitized $servername parameter when not explicitly defined. Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 1.39 seconds Oct 11 09:10:06 np0005481012 systemd[1]: var-lib-containers-storage-overlay-e4a3f05264031a64b318cff90d45ed112a0e7e496c7845ffbbd94d192c2db4bf-merged.mount: Deactivated successfully. Oct 11 09:10:06 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-e7d84eaafffa0dccc5ef7cf62fb0b91a7720a6e59942b353eaedea5cb178490d-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:06 np0005481012 podman[67995]: 2025-10-11 09:10:06.383917312 +0000 UTC m=+0.068852401 container create 4091fcdfcd7f5454183afece0c0f15543f69ee5b931e98c4963da499334ceefc (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, batch=17.1_20250721.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.33.12, name=rhosp17/openstack-nova-api, container_name=container-puppet-nova, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., vcs-type=git, build-date=2025-07-21T16:05:11, distribution-scope=public, version=17.1.9, com.redhat.license_terms=https://www.redhat.com/agreements, com.redhat.component=openstack-nova-api-container, release=1, vcs-ref=1bf0113009f3d1746f0030e40da5d2674940fc4f, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_puppet_step1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-nova-api/images/17.1.9-1, managed_by=tripleo_ansible, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1, summary=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64) Oct 11 09:10:06 np0005481012 puppet-user[67156]: Warning: Unknown variable: 'ensure'. (file: /etc/puppet/modules/manila/manifests/share.pp, line: 50, column: 18) Oct 11 09:10:06 np0005481012 puppet-user[67156]: Warning: Unknown variable: 'manila_generic_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 292, column: 48) Oct 11 09:10:06 np0005481012 puppet-user[67156]: Warning: Unknown variable: 'manila_netapp_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 294, column: 39) Oct 11 09:10:06 np0005481012 puppet-user[67156]: Warning: Unknown variable: 'manila_vmax_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 295, column: 39) Oct 11 09:10:06 np0005481012 puppet-user[67156]: Warning: Unknown variable: 'manila_powermax_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 296, column: 39) Oct 11 09:10:06 np0005481012 puppet-user[67156]: Warning: Unknown variable: 'manila_isilon_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 297, column: 39) Oct 11 09:10:06 np0005481012 puppet-user[67156]: Warning: Unknown variable: 'manila_unity_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 298, column: 39) Oct 11 09:10:06 np0005481012 puppet-user[67156]: Warning: Unknown variable: 'manila_vnx_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 299, column: 39) Oct 11 09:10:06 np0005481012 puppet-user[67156]: Warning: Unknown variable: 'manila_flashblade_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 300, column: 39) Oct 11 09:10:06 np0005481012 systemd[1]: Started libpod-conmon-4091fcdfcd7f5454183afece0c0f15543f69ee5b931e98c4963da499334ceefc.scope. Oct 11 09:10:06 np0005481012 systemd[1]: tmp-crun.m3OK3P.mount: Deactivated successfully. Oct 11 09:10:06 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:06 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a1ac5e95af3decc83db6119975ffab84173b4cc4010013b04254d99ab9eb5d64/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:06 np0005481012 podman[67995]: 2025-10-11 09:10:06.347890348 +0000 UTC m=+0.032825417 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Oct 11 09:10:06 np0005481012 podman[67995]: 2025-10-11 09:10:06.449081787 +0000 UTC m=+0.134016876 container init 4091fcdfcd7f5454183afece0c0f15543f69ee5b931e98c4963da499334ceefc (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, managed_by=tripleo_ansible, name=rhosp17/openstack-nova-api, tcib_managed=true, release=1, vcs-type=git, maintainer=OpenStack TripleO Team, version=17.1.9, config_id=tripleo_puppet_step1, architecture=x86_64, com.redhat.component=openstack-nova-api-container, vcs-ref=1bf0113009f3d1746f0030e40da5d2674940fc4f, io.openshift.expose-services=, batch=17.1_20250721.1, io.openshift.tags=rhosp osp openstack osp-17.1, summary=Red Hat OpenStack Platform 17.1 nova-api, container_name=container-puppet-nova, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/agreements, distribution-scope=public, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-nova-api/images/17.1.9-1, description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.33.12, vendor=Red Hat, Inc., build-date=2025-07-21T16:05:11) Oct 11 09:10:06 np0005481012 podman[67995]: 2025-10-11 09:10:06.455088523 +0000 UTC m=+0.140023642 container start 4091fcdfcd7f5454183afece0c0f15543f69ee5b931e98c4963da499334ceefc (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, version=17.1.9, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-nova-api/images/17.1.9-1, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1, com.redhat.component=openstack-nova-api-container, managed_by=tripleo_ansible, build-date=2025-07-21T16:05:11, name=rhosp17/openstack-nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_puppet_step1, architecture=x86_64, release=1, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-nova, vcs-ref=1bf0113009f3d1746f0030e40da5d2674940fc4f, vcs-type=git, batch=17.1_20250721.1, io.buildah.version=1.33.12, com.redhat.license_terms=https://www.redhat.com/agreements) Oct 11 09:10:06 np0005481012 podman[67995]: 2025-10-11 09:10:06.45531735 +0000 UTC m=+0.140252439 container attach 4091fcdfcd7f5454183afece0c0f15543f69ee5b931e98c4963da499334ceefc (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, container_name=container-puppet-nova, com.redhat.license_terms=https://www.redhat.com/agreements, release=1, managed_by=tripleo_ansible, build-date=2025-07-21T16:05:11, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, distribution-scope=public, vcs-type=git, description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.buildah.version=1.33.12, io.openshift.tags=rhosp osp openstack osp-17.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-nova-api/images/17.1.9-1, vendor=Red Hat, Inc., tcib_managed=true, batch=17.1_20250721.1, name=rhosp17/openstack-nova-api, version=17.1.9, vcs-ref=1bf0113009f3d1746f0030e40da5d2674940fc4f, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_puppet_step1, com.redhat.component=openstack-nova-api-container) Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Keystone_config[token/expiration]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/enable]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/certfile]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/keyfile]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/ca_certs]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/ca_key]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/cert_subject]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Keystone_config[catalog/driver]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Keystone_config[catalog/template_file]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Keystone_config[token/provider]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Keystone_config[DEFAULT/notification_format]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/File[/etc/keystone/fernet-keys]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/File[/etc/keystone/fernet-keys/0]/ensure: defined content as '{sha256}a1e278fa436ea7759d7fc6e8dc75d498b44cc6761e72ab474ba941784cf86941' Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/File[/etc/keystone/fernet-keys/1]/ensure: defined content as '{sha256}7123ab9fabed84657526c0b70eb177df5de85275d1029c76636ab4c84a9d0499' Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/File[/etc/keystone/credential-keys]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/File[/etc/keystone/credential-keys/0]/ensure: defined content as '{sha256}c1492a3d462e6690a92aa699fc358a2b547474724c882129a05e4b623a2721fb' Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/File[/etc/keystone/credential-keys/1]/ensure: defined content as '{sha256}6cb8bb801d2a1d3e62521749c12622294cf6fb8ce7aeee5342c8fe24fd59a141' Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Keystone_config[fernet_tokens/key_repository]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Keystone_config[token/revoke_by_id]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Keystone_config[fernet_tokens/max_active_keys]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Keystone_config[credential/key_repository]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Oct 11 09:10:06 np0005481012 puppet-user[67156]: Warning: Unknown variable: '::pacemaker::pcs_010'. (file: /etc/puppet/modules/pacemaker/manifests/resource/bundle.pp, line: 159, column: 6) Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Oct 11 09:10:06 np0005481012 puppet-user[67156]: Warning: Scope(Apache::Vhost[manila_wsgi]): Oct 11 09:10:06 np0005481012 puppet-user[67156]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Oct 11 09:10:06 np0005481012 puppet-user[67156]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Oct 11 09:10:06 np0005481012 puppet-user[67156]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Oct 11 09:10:06 np0005481012 puppet-user[67156]: file names. Oct 11 09:10:06 np0005481012 puppet-user[67156]: Oct 11 09:10:06 np0005481012 puppet-user[67156]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Oct 11 09:10:06 np0005481012 puppet-user[67156]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Oct 11 09:10:06 np0005481012 puppet-user[67156]: sanitized $servername parameter when not explicitly defined. Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone::Cron::Trust_flush/Cron[keystone-manage trust_flush]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/backend]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/backend_argument]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/enabled]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/memcache_servers]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/tls_enabled]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone::Logging/Oslo::Log[keystone_config]/Keystone_config[DEFAULT/debug]/ensure: created Oct 11 09:10:06 np0005481012 puppet-user[67156]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 1.50 seconds Oct 11 09:10:06 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone::Logging/Oslo::Log[keystone_config]/Keystone_config[DEFAULT/log_dir]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone::Policy/Oslo::Policy[keystone_config]/Keystone_config[oslo_policy/policy_file]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone::Db/Oslo::Db[keystone_config]/Keystone_config[database/connection]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone::Db/Oslo::Db[keystone_config]/Keystone_config[database/max_retries]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone::Db/Oslo::Db[keystone_config]/Keystone_config[database/db_max_retries]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Oslo::Middleware[keystone_config]/Keystone_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Default[keystone_config]/Keystone_config[DEFAULT/transport_url]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Notifications[keystone_config]/Keystone_config[oslo_messaging_notifications/driver]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Notifications[keystone_config]/Keystone_config[oslo_messaging_notifications/transport_url]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Notifications[keystone_config]/Keystone_config[oslo_messaging_notifications/topics]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Rabbit[keystone_config]/Keystone_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Rabbit[keystone_config]/Keystone_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/api_paste_config]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67715]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:07 np0005481012 puppet-user[67715]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:07 np0005481012 puppet-user[67715]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:07 np0005481012 puppet-user[67715]: (file & line not available) Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/storage_availability_zone]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/rootwrap_config]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/state_path]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67715]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:07 np0005481012 puppet-user[67715]: (file & line not available) Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/host]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}875243f2e37348f9a07a104dbdf95bb6d744cfa9d436685eabe6d2703419a2e5' Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}4f73037b8196b0bab62c9c1419ef1b40c67b2055f31a8617a1adf8493a295c5b' Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/osapi_share_listen]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/enabled_share_protocols]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Oct 11 09:10:07 np0005481012 puppet-user[67715]: Notice: Accepting previously invalid value for target type 'Integer' Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/default_share_type]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/osapi_share_workers]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/auth_strategy]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Cron::Db_purge/Cron[manila-manage db purge]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67715]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 0.13 seconds Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone::Wsgi::Apache/Openstacklib::Wsgi::Apache[keystone_wsgi]/File[/var/www/cgi-bin/keystone]/group: group changed 'root' to 'keystone' Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/auth_url]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone::Wsgi::Apache/Openstacklib::Wsgi::Apache[keystone_wsgi]/File[keystone_wsgi]/ensure: defined content as '{sha256}55e95baab868583f1b6646e2dcc61edb7f403991f97d4397478e9a9dd3e7d1f2' Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/auth_type]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67715]: Notice: /Stage[main]/Qdr::Config/File[/var/lib/qdrouterd]/owner: owner changed 'qdrouterd' to 'root' Oct 11 09:10:07 np0005481012 puppet-user[67715]: Notice: /Stage[main]/Qdr::Config/File[/var/lib/qdrouterd]/group: group changed 'qdrouterd' to 'root' Oct 11 09:10:07 np0005481012 puppet-user[67715]: Notice: /Stage[main]/Qdr::Config/File[/var/lib/qdrouterd]/mode: mode changed '0700' to '0755' Oct 11 09:10:07 np0005481012 puppet-user[67715]: Notice: /Stage[main]/Qdr::Config/File[/etc/qpid-dispatch/ssl]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/region_name]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67715]: Notice: /Stage[main]/Qdr::Config/File[qdrouterd.conf]/content: content changed '{sha256}89e10d8896247f992c5f0baf027c25a8ca5d0441be46d8859d9db2067ea74cd3' to '{sha256}d996a50ffc28d705bf52ca550a76267edd18b780efbe9a6373c43eb4c0dc733d' Oct 11 09:10:07 np0005481012 puppet-user[67715]: Notice: /Stage[main]/Qdr::Config/File[/var/log/qdrouterd]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67715]: Notice: /Stage[main]/Qdr::Config/File[/var/log/qdrouterd/metrics_qdr.log]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/username]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67715]: Notice: Applied catalog in 0.03 seconds Oct 11 09:10:07 np0005481012 puppet-user[67715]: Application: Oct 11 09:10:07 np0005481012 puppet-user[67715]: Initial environment: production Oct 11 09:10:07 np0005481012 puppet-user[67715]: Converged environment: production Oct 11 09:10:07 np0005481012 puppet-user[67715]: Run mode: user Oct 11 09:10:07 np0005481012 puppet-user[67715]: Changes: Oct 11 09:10:07 np0005481012 puppet-user[67715]: Total: 7 Oct 11 09:10:07 np0005481012 puppet-user[67715]: Events: Oct 11 09:10:07 np0005481012 puppet-user[67715]: Success: 7 Oct 11 09:10:07 np0005481012 puppet-user[67715]: Total: 7 Oct 11 09:10:07 np0005481012 puppet-user[67715]: Resources: Oct 11 09:10:07 np0005481012 puppet-user[67715]: Skipped: 13 Oct 11 09:10:07 np0005481012 puppet-user[67715]: Changed: 5 Oct 11 09:10:07 np0005481012 puppet-user[67715]: Out of sync: 5 Oct 11 09:10:07 np0005481012 puppet-user[67715]: Total: 20 Oct 11 09:10:07 np0005481012 puppet-user[67715]: Time: Oct 11 09:10:07 np0005481012 puppet-user[67715]: File: 0.01 Oct 11 09:10:07 np0005481012 puppet-user[67715]: Transaction evaluation: 0.03 Oct 11 09:10:07 np0005481012 puppet-user[67715]: Catalog application: 0.03 Oct 11 09:10:07 np0005481012 puppet-user[67715]: Config retrieval: 0.17 Oct 11 09:10:07 np0005481012 puppet-user[67715]: Last run: 1760173807 Oct 11 09:10:07 np0005481012 puppet-user[67715]: Total: 0.03 Oct 11 09:10:07 np0005481012 puppet-user[67715]: Version: Oct 11 09:10:07 np0005481012 puppet-user[67715]: Config: 1760173807 Oct 11 09:10:07 np0005481012 puppet-user[67715]: Puppet: 7.10.0 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/auth_mellon.conf]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/user_domain_name]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/password]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/auth_openidc.conf]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/project_name]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/project_domain_name]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[DEFAULT/network_api_class]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/auth_url]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67905]: Error: Facter: error while resolving custom fact "haproxy_version": undefined method `strip' for nil:NilClass Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-auth_gssapi.conf]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-auth_mellon.conf]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-auth_openidc.conf]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/auth_type]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Oct 11 09:10:07 np0005481012 ovs-vsctl[68136]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: /Stage[main]/Keystone::Wsgi::Apache/Openstacklib::Wsgi::Apache[keystone_wsgi]/Apache::Vhost[keystone_wsgi]/Concat[10-keystone_wsgi.conf]/File[/etc/httpd/conf.d/10-keystone_wsgi.conf]/ensure: defined content as '{sha256}464af68045842a387149ad7f73ba19a90bfa4ff5a40f0d15e3ca2c8849798cb9' Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/region_name]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/username]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[66876]: Notice: Applied catalog in 1.12 seconds Oct 11 09:10:07 np0005481012 puppet-user[66876]: Application: Oct 11 09:10:07 np0005481012 puppet-user[66876]: Initial environment: production Oct 11 09:10:07 np0005481012 puppet-user[66876]: Converged environment: production Oct 11 09:10:07 np0005481012 puppet-user[66876]: Run mode: user Oct 11 09:10:07 np0005481012 puppet-user[66876]: Changes: Oct 11 09:10:07 np0005481012 puppet-user[66876]: Total: 88 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Events: Oct 11 09:10:07 np0005481012 puppet-user[66876]: Success: 88 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Total: 88 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Resources: Oct 11 09:10:07 np0005481012 puppet-user[66876]: Skipped: 32 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Changed: 88 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Out of sync: 88 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Total: 280 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Time: Oct 11 09:10:07 np0005481012 puppet-user[66876]: Concat file: 0.00 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Concat fragment: 0.00 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Cron: 0.01 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Augeas: 0.02 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Package: 0.03 Oct 11 09:10:07 np0005481012 puppet-user[66876]: File: 0.16 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Keystone config: 0.67 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Transaction evaluation: 1.11 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Catalog application: 1.12 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Config retrieval: 1.59 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Last run: 1760173807 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Resources: 0.00 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Total: 1.12 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Version: Oct 11 09:10:07 np0005481012 puppet-user[66876]: Config: 1760173804 Oct 11 09:10:07 np0005481012 puppet-user[66876]: Puppet: 7.10.0 Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/user_domain_name]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/password]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/project_name]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/project_domain_name]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[DEFAULT/network_plugin_ipv4_enabled]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[DEFAULT/network_plugin_ipv6_enabled]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Backends/Manila_config[DEFAULT/enabled_share_backends]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Db/Oslo::Db[manila_config]/Manila_config[database/connection]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67905]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:07 np0005481012 puppet-user[67905]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:07 np0005481012 puppet-user[67905]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:07 np0005481012 puppet-user[67905]: (file & line not available) Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Db/Oslo::Db[manila_config]/Manila_config[database/max_retries]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67905]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:07 np0005481012 puppet-user[67905]: (file & line not available) Oct 11 09:10:07 np0005481012 systemd[1]: libpod-93a2d5a502a684d4f2e3cfdcddecd57e3e7d2bf208993a4a945f20d3c1375ebc.scope: Deactivated successfully. Oct 11 09:10:07 np0005481012 systemd[1]: libpod-93a2d5a502a684d4f2e3cfdcddecd57e3e7d2bf208993a4a945f20d3c1375ebc.scope: Consumed 2.173s CPU time. Oct 11 09:10:07 np0005481012 podman[67585]: 2025-10-11 09:10:07.722369281 +0000 UTC m=+2.468854335 container died 93a2d5a502a684d4f2e3cfdcddecd57e3e7d2bf208993a4a945f20d3c1375ebc (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/agreements, container_name=container-puppet-metrics_qdr, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20250721.1, name=rhosp17/openstack-qdrouterd, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, io.openshift.expose-services=, config_id=tripleo_puppet_step1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-qdrouterd/images/17.1.9-1, vcs-ref=4a9cf7084a7631a8cf28014f76f8f9d6da5b1fed, vcs-type=git, version=17.1.9, description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, build-date=2025-07-21T13:07:59, io.buildah.version=1.33.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 qdrouterd) Oct 11 09:10:07 np0005481012 puppet-user[67905]: Warning: Unknown variable: 'dhcp_agents_per_net'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/neutron.pp, line: 154, column: 37) Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Db/Oslo::Db[manila_config]/Manila_config[database/db_max_retries]/ensure: created Oct 11 09:10:07 np0005481012 systemd[1]: tmp-crun.3G27jt.mount: Deactivated successfully. Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila/Oslo::Messaging::Rabbit[manila_config]/Manila_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Oct 11 09:10:07 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-93a2d5a502a684d4f2e3cfdcddecd57e3e7d2bf208993a4a945f20d3c1375ebc-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:07 np0005481012 podman[68228]: 2025-10-11 09:10:07.808181186 +0000 UTC m=+0.075073304 container cleanup 93a2d5a502a684d4f2e3cfdcddecd57e3e7d2bf208993a4a945f20d3c1375ebc (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, io.openshift.tags=rhosp osp openstack osp-17.1, name=rhosp17/openstack-qdrouterd, vendor=Red Hat, Inc., io.buildah.version=1.33.12, com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-07-21T13:07:59, description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, version=17.1.9, vcs-type=git, config_id=tripleo_puppet_step1, container_name=container-puppet-metrics_qdr, maintainer=OpenStack TripleO Team, tcib_managed=true, batch=17.1_20250721.1, vcs-ref=4a9cf7084a7631a8cf28014f76f8f9d6da5b1fed, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, release=1, architecture=x86_64, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-qdrouterd/images/17.1.9-1) Oct 11 09:10:07 np0005481012 systemd[1]: libpod-conmon-93a2d5a502a684d4f2e3cfdcddecd57e3e7d2bf208993a4a945f20d3c1375ebc.scope: Deactivated successfully. Oct 11 09:10:07 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-metrics_qdr --conmon-pidfile /run/container-puppet-metrics_qdr.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron --env NAME=metrics_qdr --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::metrics::qdr#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-metrics_qdr --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-metrics_qdr.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/server_request_prefix]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/broadcast_prefix]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/group_request_prefix]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67872]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:07 np0005481012 puppet-user[67872]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:07 np0005481012 puppet-user[67872]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:07 np0005481012 puppet-user[67872]: (file & line not available) Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/container_name]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/idle_timeout]/ensure: created Oct 11 09:10:07 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/trace]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila/Oslo::Messaging::Default[manila_config]/Manila_config[DEFAULT/transport_url]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila/Oslo::Messaging::Default[manila_config]/Manila_config[DEFAULT/control_exchange]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67872]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:08 np0005481012 puppet-user[67872]: (file & line not available) Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila/Oslo::Messaging::Notifications[manila_config]/Manila_config[oslo_messaging_notifications/driver]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila/Oslo::Messaging::Notifications[manila_config]/Manila_config[oslo_messaging_notifications/transport_url]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila/Oslo::Concurrency[manila_config]/Manila_config[oslo_concurrency/lock_path]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Logging/Oslo::Log[manila_config]/Manila_config[DEFAULT/debug]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Logging/Oslo::Log[manila_config]/Manila_config[DEFAULT/log_dir]/ensure: created Oct 11 09:10:08 np0005481012 systemd[1]: libpod-806a0217ac4725b660ae161c8642c97ea8bfc8baff6f4526b29bb90ffa70d307.scope: Deactivated successfully. Oct 11 09:10:08 np0005481012 systemd[1]: libpod-806a0217ac4725b660ae161c8642c97ea8bfc8baff6f4526b29bb90ffa70d307.scope: Consumed 4.913s CPU time. Oct 11 09:10:08 np0005481012 podman[66771]: 2025-10-11 09:10:08.124417217 +0000 UTC m=+5.362135607 container died 806a0217ac4725b660ae161c8642c97ea8bfc8baff6f4526b29bb90ffa70d307 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.tags=rhosp osp openstack osp-17.1, vcs-ref=0693142a4093f932157b8019660e85aa608befc8, distribution-scope=public, version=17.1.9, vendor=Red Hat, Inc., tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, architecture=x86_64, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, io.openshift.expose-services=, io.buildah.version=1.33.12, build-date=2025-07-21T13:27:18, name=rhosp17/openstack-keystone, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-keystone/images/17.1.9-1, container_name=container-puppet-keystone, vcs-type=git, description=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 keystone, batch=17.1_20250721.1, release=1, com.redhat.component=openstack-keystone-container) Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/www_authenticate_uri]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/auth_type]/ensure: created Oct 11 09:10:08 np0005481012 ovs-vsctl[68409]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Oct 11 09:10:08 np0005481012 podman[68389]: 2025-10-11 09:10:08.208519639 +0000 UTC m=+0.075090144 container cleanup 806a0217ac4725b660ae161c8642c97ea8bfc8baff6f4526b29bb90ffa70d307 (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-keystone/images/17.1.9-1, batch=17.1_20250721.1, com.redhat.component=openstack-keystone-container, description=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., build-date=2025-07-21T13:27:18, io.openshift.tags=rhosp osp openstack osp-17.1, managed_by=tripleo_ansible, container_name=container-puppet-keystone, vcs-type=git, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 keystone, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.9, io.openshift.expose-services=, vcs-ref=0693142a4093f932157b8019660e85aa608befc8, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, release=1, architecture=x86_64, name=rhosp17/openstack-keystone, io.buildah.version=1.33.12, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/agreements) Oct 11 09:10:08 np0005481012 systemd[1]: libpod-conmon-806a0217ac4725b660ae161c8642c97ea8bfc8baff6f4526b29bb90ffa70d307.scope: Deactivated successfully. Oct 11 09:10:08 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-keystone --conmon-pidfile /run/container-puppet-keystone.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config --env NAME=keystone --env STEP_CONFIG=include ::tripleo::packages#012['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }#012include tripleo::profile::base::keystone#012#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-keystone --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-keystone.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67872]: Could not connect to the CIB: Transport endpoint is not connected Oct 11 09:10:08 np0005481012 puppet-user[67872]: Init failed, could not perform requested operations Oct 11 09:10:08 np0005481012 puppet-user[67872]: -:1: parser error : Document is empty Oct 11 09:10:08 np0005481012 puppet-user[67872]: Oct 11 09:10:08 np0005481012 puppet-user[67872]: ^ Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/memcached_servers]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/region_name]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/auth_url]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/username]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/password]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/user_domain_name]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/project_name]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/project_domain_name]/ensure: created Oct 11 09:10:08 np0005481012 podman[68372]: 2025-10-11 09:10:08.33629086 +0000 UTC m=+0.246163214 container create f052f9a721ab8cc1c16f8c854e9ae6bf7670c5a9887e326151b77fc786d23902 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, config_id=tripleo_puppet_step1, architecture=x86_64, vcs-ref=1bf0113009f3d1746f0030e40da5d2674940fc4f, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.9, batch=17.1_20250721.1, name=rhosp17/openstack-nova-api, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, distribution-scope=public, managed_by=tripleo_ansible, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-nova-api/images/17.1.9-1, description=Red Hat OpenStack Platform 17.1 nova-api, release=1, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-nova-api-container, com.redhat.license_terms=https://www.redhat.com/agreements, io.buildah.version=1.33.12, io.openshift.expose-services=, vcs-type=git, container_name=container-puppet-nova_metadata, build-date=2025-07-21T16:05:11, io.openshift.tags=rhosp osp openstack osp-17.1) Oct 11 09:10:08 np0005481012 podman[68372]: 2025-10-11 09:10:08.239230419 +0000 UTC m=+0.149102843 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Oct 11 09:10:08 np0005481012 systemd[1]: var-lib-containers-storage-overlay-772631badb6adb334788fa3d81ae0d4e228ff18a34bbad9b839f7614eedf92ff-merged.mount: Deactivated successfully. Oct 11 09:10:08 np0005481012 systemd[1]: var-lib-containers-storage-overlay-328eef90dda1e2954fcff920ffa35da864bde01e433227cd34584a8716487c23-merged.mount: Deactivated successfully. Oct 11 09:10:08 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-806a0217ac4725b660ae161c8642c97ea8bfc8baff6f4526b29bb90ffa70d307-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:08 np0005481012 systemd[1]: Started libpod-conmon-f052f9a721ab8cc1c16f8c854e9ae6bf7670c5a9887e326151b77fc786d23902.scope. Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/interface]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}cf3017b8476bb034424a82e9ef613fcded0d0cbd03721bfc05b105e5fbb561e9' Oct 11 09:10:08 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:08 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/9e5280cb62e6bbd37af133e18c730e6bbcebfefa6dca8653357a8b27161ebb80/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}4f73037b8196b0bab62c9c1419ef1b40c67b2055f31a8617a1adf8493a295c5b' Oct 11 09:10:08 np0005481012 podman[68372]: 2025-10-11 09:10:08.377442703 +0000 UTC m=+0.287315047 container init f052f9a721ab8cc1c16f8c854e9ae6bf7670c5a9887e326151b77fc786d23902 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, version=17.1.9, build-date=2025-07-21T16:05:11, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-ref=1bf0113009f3d1746f0030e40da5d2674940fc4f, tcib_managed=true, distribution-scope=public, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20250721.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-nova_metadata, release=1, config_id=tripleo_puppet_step1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-nova-api/images/17.1.9-1, name=rhosp17/openstack-nova-api, io.openshift.expose-services=, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1, architecture=x86_64, com.redhat.component=openstack-nova-api-container, io.buildah.version=1.33.12, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible) Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Oct 11 09:10:08 np0005481012 podman[68372]: 2025-10-11 09:10:08.386557495 +0000 UTC m=+0.296429859 container start f052f9a721ab8cc1c16f8c854e9ae6bf7670c5a9887e326151b77fc786d23902 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, batch=17.1_20250721.1, container_name=container-puppet-nova_metadata, name=rhosp17/openstack-nova-api, vendor=Red Hat, Inc., tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/agreements, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=1bf0113009f3d1746f0030e40da5d2674940fc4f, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.9, build-date=2025-07-21T16:05:11, io.openshift.tags=rhosp osp openstack osp-17.1, release=1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-nova-api/images/17.1.9-1, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.openshift.expose-services=, io.buildah.version=1.33.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_puppet_step1, architecture=x86_64, com.redhat.component=openstack-nova-api-container, vcs-type=git, distribution-scope=public) Oct 11 09:10:08 np0005481012 podman[68372]: 2025-10-11 09:10:08.386763452 +0000 UTC m=+0.296635806 container attach f052f9a721ab8cc1c16f8c854e9ae6bf7670c5a9887e326151b77fc786d23902 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, com.redhat.license_terms=https://www.redhat.com/agreements, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, distribution-scope=public, io.buildah.version=1.33.12, io.openshift.tags=rhosp osp openstack osp-17.1, tcib_managed=true, vcs-ref=1bf0113009f3d1746f0030e40da5d2674940fc4f, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-07-21T16:05:11, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-nova-api/images/17.1.9-1, name=rhosp17/openstack-nova-api, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-nova-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., release=1, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, managed_by=tripleo_ansible, io.openshift.expose-services=, batch=17.1_20250721.1, container_name=container-puppet-nova_metadata) Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Oct 11 09:10:08 np0005481012 puppet-user[68026]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:08 np0005481012 puppet-user[68026]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:08 np0005481012 puppet-user[68026]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:08 np0005481012 puppet-user[68026]: (file & line not available) Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Policy/Oslo::Policy[manila_config]/Manila_config[oslo_policy/policy_file]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[68026]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:08 np0005481012 puppet-user[68026]: (file & line not available) Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Api/Oslo::Middleware[manila_config]/Manila_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Wsgi::Apache/Openstacklib::Wsgi::Apache[manila_wsgi]/File[/var/www/cgi-bin/manila]/group: group changed 'root' to 'manila' Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Wsgi::Apache/Openstacklib::Wsgi::Apache[manila_wsgi]/File[manila_wsgi]/ensure: defined content as '{sha256}ca07199ace8325d094e754ccdfefb2b5a78a13cd657d68221b3a68b53b0dd893' Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/driver_handles_share_servers]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/share_backend_name]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/share_driver]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_conf_path]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_auth_id]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_cluster_name]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_ganesha_server_ip]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_ganesha_server_is_remote]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_volume_mode]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_protocol_helper_type]/ensure: created Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: /Stage[main]/Manila::Wsgi::Apache/Openstacklib::Wsgi::Apache[manila_wsgi]/Apache::Vhost[manila_wsgi]/Concat[10-manila_wsgi.conf]/File[/etc/httpd/conf.d/10-manila_wsgi.conf]/ensure: defined content as '{sha256}2d8ecd08b8a17f5e812693061ffeb3724515a00d78268e602fc88f083f1554ff' Oct 11 09:10:08 np0005481012 puppet-user[67156]: Notice: Applied catalog in 1.54 seconds Oct 11 09:10:08 np0005481012 puppet-user[67156]: Application: Oct 11 09:10:08 np0005481012 puppet-user[67156]: Initial environment: production Oct 11 09:10:08 np0005481012 puppet-user[67156]: Converged environment: production Oct 11 09:10:08 np0005481012 puppet-user[67156]: Run mode: user Oct 11 09:10:08 np0005481012 puppet-user[67156]: Changes: Oct 11 09:10:08 np0005481012 puppet-user[67156]: Total: 115 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Events: Oct 11 09:10:08 np0005481012 puppet-user[67156]: Success: 115 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Total: 115 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Resources: Oct 11 09:10:08 np0005481012 puppet-user[67156]: Changed: 115 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Out of sync: 115 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Skipped: 51 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Total: 334 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Time: Oct 11 09:10:08 np0005481012 puppet-user[67156]: Resources: 0.00 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Concat file: 0.00 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Concat fragment: 0.00 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Cron: 0.02 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Augeas: 0.02 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Package: 0.02 Oct 11 09:10:08 np0005481012 puppet-user[67156]: File: 0.09 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Manila config: 1.14 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Transaction evaluation: 1.53 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Catalog application: 1.54 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Config retrieval: 1.67 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Last run: 1760173808 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Total: 1.54 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Version: Oct 11 09:10:08 np0005481012 puppet-user[67156]: Config: 1760173805 Oct 11 09:10:08 np0005481012 puppet-user[67156]: Puppet: 7.10.0 Oct 11 09:10:08 np0005481012 puppet-user[68026]: Warning: Scope(Class[Nova]): The os_region_name parameter is deprecated and will be removed \ Oct 11 09:10:08 np0005481012 puppet-user[68026]: in a future release. Use nova::cinder::os_region_name instead Oct 11 09:10:08 np0005481012 puppet-user[68026]: Warning: Scope(Class[Nova]): The catalog_info parameter is deprecated and will be removed \ Oct 11 09:10:08 np0005481012 puppet-user[68026]: in a future release. Use nova::cinder::catalog_info instead Oct 11 09:10:08 np0005481012 puppet-user[68026]: Warning: Scope(Class[Nova]): The database_connection parameter is deprecated and will be \ Oct 11 09:10:08 np0005481012 puppet-user[68026]: removed in a future realse. Use nova::db::database_connection instead Oct 11 09:10:08 np0005481012 puppet-user[68026]: Warning: Scope(Class[Nova]): The api_database_connection parameter is deprecated and will be \ Oct 11 09:10:08 np0005481012 puppet-user[68026]: removed in a future realse. Use nova::db::api_database_connection instead Oct 11 09:10:08 np0005481012 podman[68542]: 2025-10-11 09:10:08.704550991 +0000 UTC m=+0.084988889 container create 33733e069b969a2c0b2ea4d6d31f39e7ecee4c7a32d208f21011a73caed83f10 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, container_name=container-puppet-crond, io.openshift.tags=rhosp osp openstack osp-17.1, name=rhosp17/openstack-cron, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, io.openshift.expose-services=, vendor=Red Hat, Inc., release=1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-cron/images/17.1.9-1, com.redhat.component=openstack-cron-container, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-ref=1cbdeb2f9fe67da66c8007dc1c7f4220cefddf6c, vcs-type=git, architecture=x86_64, io.buildah.version=1.33.12, version=17.1.9, description=Red Hat OpenStack Platform 17.1 cron, distribution-scope=public, config_id=tripleo_puppet_step1, build-date=2025-07-21T13:07:52, summary=Red Hat OpenStack Platform 17.1 cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, batch=17.1_20250721.1, tcib_managed=true) Oct 11 09:10:08 np0005481012 systemd[1]: Started libpod-conmon-33733e069b969a2c0b2ea4d6d31f39e7ecee4c7a32d208f21011a73caed83f10.scope. Oct 11 09:10:08 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:08 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/62e1d4e35a0cc5d94d3b28bc0b8640ee6a2ee7d176953912bc6ddd7e3650f0bf/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:08 np0005481012 podman[68542]: 2025-10-11 09:10:08.760061299 +0000 UTC m=+0.140499207 container init 33733e069b969a2c0b2ea4d6d31f39e7ecee4c7a32d208f21011a73caed83f10 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, managed_by=tripleo_ansible, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, vcs-ref=1cbdeb2f9fe67da66c8007dc1c7f4220cefddf6c, container_name=container-puppet-crond, release=1, io.openshift.tags=rhosp osp openstack osp-17.1, vcs-type=git, com.redhat.component=openstack-cron-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.33.12, name=rhosp17/openstack-cron, description=Red Hat OpenStack Platform 17.1 cron, com.redhat.license_terms=https://www.redhat.com/agreements, build-date=2025-07-21T13:07:52, distribution-scope=public, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-cron/images/17.1.9-1, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, batch=17.1_20250721.1, architecture=x86_64, version=17.1.9, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 cron) Oct 11 09:10:08 np0005481012 podman[68542]: 2025-10-11 09:10:08.662958555 +0000 UTC m=+0.043396453 image pull registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Oct 11 09:10:08 np0005481012 podman[68542]: 2025-10-11 09:10:08.768283553 +0000 UTC m=+0.148721481 container start 33733e069b969a2c0b2ea4d6d31f39e7ecee4c7a32d208f21011a73caed83f10 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, vendor=Red Hat, Inc., vcs-type=git, io.buildah.version=1.33.12, batch=17.1_20250721.1, com.redhat.license_terms=https://www.redhat.com/agreements, version=17.1.9, vcs-ref=1cbdeb2f9fe67da66c8007dc1c7f4220cefddf6c, name=rhosp17/openstack-cron, architecture=x86_64, io.openshift.expose-services=, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, container_name=container-puppet-crond, build-date=2025-07-21T13:07:52, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, maintainer=OpenStack TripleO Team, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-cron/images/17.1.9-1, com.redhat.component=openstack-cron-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, description=Red Hat OpenStack Platform 17.1 cron, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 cron, io.openshift.tags=rhosp osp openstack osp-17.1, tcib_managed=true, release=1) Oct 11 09:10:08 np0005481012 podman[68542]: 2025-10-11 09:10:08.768800549 +0000 UTC m=+0.149238497 container attach 33733e069b969a2c0b2ea4d6d31f39e7ecee4c7a32d208f21011a73caed83f10 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, vcs-type=git, com.redhat.component=openstack-cron-container, managed_by=tripleo_ansible, io.openshift.expose-services=, distribution-scope=public, release=1, summary=Red Hat OpenStack Platform 17.1 cron, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-cron/images/17.1.9-1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, vcs-ref=1cbdeb2f9fe67da66c8007dc1c7f4220cefddf6c, io.openshift.tags=rhosp osp openstack osp-17.1, io.buildah.version=1.33.12, name=rhosp17/openstack-cron, batch=17.1_20250721.1, container_name=container-puppet-crond, version=17.1.9, config_id=tripleo_puppet_step1, build-date=2025-07-21T13:07:52, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 cron, com.redhat.license_terms=https://www.redhat.com/agreements, tcib_managed=true, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron) Oct 11 09:10:08 np0005481012 puppet-user[68026]: Warning: Unknown variable: '::nova::compute::verify_glance_signatures'. (file: /etc/puppet/modules/nova/manifests/glance.pp, line: 62, column: 41) Oct 11 09:10:09 np0005481012 puppet-user[67872]: Warning: Unknown variable: '::pacemaker::pcs_010'. (file: /etc/puppet/modules/pacemaker/manifests/resource/bundle.pp, line: 159, column: 6) Oct 11 09:10:09 np0005481012 systemd[1]: libpod-8e37f2a9a81a80e43c64cadb7959f1bed57c252970087ecbc472861fee9af02b.scope: Deactivated successfully. Oct 11 09:10:09 np0005481012 systemd[1]: libpod-8e37f2a9a81a80e43c64cadb7959f1bed57c252970087ecbc472861fee9af02b.scope: Consumed 5.380s CPU time. Oct 11 09:10:09 np0005481012 podman[67084]: 2025-10-11 09:10:09.230239162 +0000 UTC m=+5.772491531 container died 8e37f2a9a81a80e43c64cadb7959f1bed57c252970087ecbc472861fee9af02b (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, name=rhosp17/openstack-manila-api, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, version=17.1.9, com.redhat.license_terms=https://www.redhat.com/agreements, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, summary=Red Hat OpenStack Platform 17.1 manila-api, container_name=container-puppet-manila, release=1, tcib_managed=true, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 manila-api, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-manila-api/images/17.1.9-1, batch=17.1_20250721.1, vcs-ref=31c319d283854993bff29633e1e018a905c8b3a8, build-date=2025-07-21T16:06:43, distribution-scope=public, config_id=tripleo_puppet_step1, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.33.12, com.redhat.component=openstack-manila-api-container, io.openshift.tags=rhosp osp openstack osp-17.1, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.expose-services=, vendor=Red Hat, Inc.) Oct 11 09:10:09 np0005481012 podman[68607]: 2025-10-11 09:10:09.331187674 +0000 UTC m=+0.092533763 container cleanup 8e37f2a9a81a80e43c64cadb7959f1bed57c252970087ecbc472861fee9af02b (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, architecture=x86_64, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-manila-api/images/17.1.9-1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, release=1, version=17.1.9, io.openshift.tags=rhosp osp openstack osp-17.1, maintainer=OpenStack TripleO Team, tcib_managed=true, build-date=2025-07-21T16:06:43, description=Red Hat OpenStack Platform 17.1 manila-api, distribution-scope=public, vendor=Red Hat, Inc., container_name=container-puppet-manila, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, summary=Red Hat OpenStack Platform 17.1 manila-api, io.buildah.version=1.33.12, io.openshift.expose-services=, batch=17.1_20250721.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=31c319d283854993bff29633e1e018a905c8b3a8, com.redhat.license_terms=https://www.redhat.com/agreements, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, name=rhosp17/openstack-manila-api, vcs-type=git, com.redhat.component=openstack-manila-api-container) Oct 11 09:10:09 np0005481012 systemd[1]: libpod-conmon-8e37f2a9a81a80e43c64cadb7959f1bed57c252970087ecbc472861fee9af02b.scope: Deactivated successfully. Oct 11 09:10:09 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-manila --conmon-pidfile /run/container-puppet-manila.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line --env NAME=manila --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::manila::api#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::manila::scheduler#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::pacemaker::manila::share_bundle#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-manila --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-manila.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Oct 11 09:10:09 np0005481012 systemd[1]: var-lib-containers-storage-overlay-c0bac2363e145391f734f5563e61fd4829473f6c9287915fb6e7a9d8bc07c62f-merged.mount: Deactivated successfully. Oct 11 09:10:09 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-8e37f2a9a81a80e43c64cadb7959f1bed57c252970087ecbc472861fee9af02b-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:09 np0005481012 puppet-user[67872]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 1.47 seconds Oct 11 09:10:09 np0005481012 puppet-user[67905]: Warning: Scope(Apache::Vhost[neutron-api-proxy]): Oct 11 09:10:09 np0005481012 puppet-user[67905]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Oct 11 09:10:09 np0005481012 puppet-user[67905]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Oct 11 09:10:09 np0005481012 puppet-user[67905]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Oct 11 09:10:09 np0005481012 puppet-user[67905]: file names. Oct 11 09:10:09 np0005481012 puppet-user[67905]: Oct 11 09:10:09 np0005481012 puppet-user[67905]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Oct 11 09:10:09 np0005481012 puppet-user[67905]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Oct 11 09:10:09 np0005481012 puppet-user[67905]: sanitized $servername parameter when not explicitly defined. Oct 11 09:10:09 np0005481012 puppet-user[68026]: Warning: Unknown variable: '::nova::scheduler::filter::scheduler_max_attempts'. (file: /etc/puppet/modules/nova/manifests/scheduler.pp, line: 122, column: 29) Oct 11 09:10:09 np0005481012 puppet-user[68026]: Warning: Unknown variable: '::nova::scheduler::filter::periodic_task_interval'. (file: /etc/puppet/modules/nova/manifests/scheduler.pp, line: 123, column: 39) Oct 11 09:10:09 np0005481012 puppet-user[68026]: Warning: Scope(Class[Nova::Scheduler::Filter]): The nova::scheduler::filter::scheduler_max_attempts parameter has been deprecated and \ Oct 11 09:10:09 np0005481012 puppet-user[68026]: will be removed in a future release. Use the nova::scheduler::max_attempts parameter instead. Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 1.88 seconds Oct 11 09:10:09 np0005481012 puppet-user[67872]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Database::Mysql_bundle/File[/etc/sysconfig/clustercheck]/ensure: defined content as '{sha256}e31356797bd5be47211cfea36f4dfd096e611c619fa4e423b01ff3aa8ec85502' Oct 11 09:10:09 np0005481012 puppet-user[67872]: Notice: /Stage[main]/Mysql::Server::Config/File[mysql-config-file]/content: content changed '{sha256}df7b18b99470a82afb1aebff284d910b04ceb628c9ac89d8e2fe9fb4682d5fc9' to '{sha256}d8a7bb480a2a234d5960782ae03955eaa78c8f68052196571b406e6610266bcf' Oct 11 09:10:09 np0005481012 puppet-user[67872]: Notice: /Stage[main]/Mysql::Server::Installdb/File[/var/log/mariadb/mariadb.log]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67872]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Database::Mysql_bundle/File[/root/.my.cnf]/ensure: defined content as '{sha256}8213eaf59979d77cf088703c2c25623bfb7eb35db6174e6e7d7ae10e649203a4' Oct 11 09:10:09 np0005481012 puppet-user[67872]: Notice: Applied catalog in 0.20 seconds Oct 11 09:10:09 np0005481012 puppet-user[67872]: Application: Oct 11 09:10:09 np0005481012 puppet-user[67872]: Initial environment: production Oct 11 09:10:09 np0005481012 puppet-user[67872]: Converged environment: production Oct 11 09:10:09 np0005481012 puppet-user[67872]: Run mode: user Oct 11 09:10:09 np0005481012 puppet-user[67872]: Changes: Oct 11 09:10:09 np0005481012 puppet-user[67872]: Total: 4 Oct 11 09:10:09 np0005481012 puppet-user[67872]: Events: Oct 11 09:10:09 np0005481012 puppet-user[67872]: Success: 4 Oct 11 09:10:09 np0005481012 puppet-user[67872]: Total: 4 Oct 11 09:10:09 np0005481012 puppet-user[67872]: Resources: Oct 11 09:10:09 np0005481012 puppet-user[67872]: Skipped: 151 Oct 11 09:10:09 np0005481012 puppet-user[67872]: Changed: 4 Oct 11 09:10:09 np0005481012 puppet-user[67872]: Out of sync: 4 Oct 11 09:10:09 np0005481012 puppet-user[67872]: Total: 156 Oct 11 09:10:09 np0005481012 puppet-user[67872]: Time: Oct 11 09:10:09 np0005481012 puppet-user[67872]: File: 0.02 Oct 11 09:10:09 np0005481012 puppet-user[67872]: Transaction evaluation: 0.19 Oct 11 09:10:09 np0005481012 puppet-user[67872]: Catalog application: 0.20 Oct 11 09:10:09 np0005481012 puppet-user[67872]: Config retrieval: 1.57 Oct 11 09:10:09 np0005481012 puppet-user[67872]: Last run: 1760173809 Oct 11 09:10:09 np0005481012 puppet-user[67872]: Total: 0.20 Oct 11 09:10:09 np0005481012 puppet-user[67872]: Version: Oct 11 09:10:09 np0005481012 puppet-user[67872]: Config: 1760173807 Oct 11 09:10:09 np0005481012 puppet-user[67872]: Puppet: 7.10.0 Oct 11 09:10:09 np0005481012 podman[68673]: 2025-10-11 09:10:09.757934064 +0000 UTC m=+0.093930277 container create 8965ad68e86a3e066b96f3bee097aee00850606f98ede844a8a86a28c493050c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-ovn-controller/images/17.1.9-1, io.openshift.tags=rhosp osp openstack osp-17.1, description=Red Hat OpenStack Platform 17.1 ovn-controller, vendor=Red Hat, Inc., version=17.1.9, vcs-type=git, vcs-ref=f1f0bbd48091f4ceb6d7f5422dfd17725d070245, com.redhat.component=openstack-ovn-controller-container, tcib_managed=true, name=rhosp17/openstack-ovn-controller, container_name=container-puppet-ovn_controller, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/agreements, batch=17.1_20250721.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, release=1, summary=Red Hat OpenStack Platform 17.1 ovn-controller, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, build-date=2025-07-21T13:28:44, config_id=tripleo_puppet_step1, architecture=x86_64, distribution-scope=public, io.buildah.version=1.33.12) Oct 11 09:10:09 np0005481012 systemd[1]: Started libpod-conmon-8965ad68e86a3e066b96f3bee097aee00850606f98ede844a8a86a28c493050c.scope. Oct 11 09:10:09 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:09 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/b7cc74a80005a9560d765d3fb168bb0428c40a542fd998bcc7d15e303d36f6a6/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:09 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/b7cc74a80005a9560d765d3fb168bb0428c40a542fd998bcc7d15e303d36f6a6/merged/etc/sysconfig/modules supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:09 np0005481012 podman[68673]: 2025-10-11 09:10:09.714778989 +0000 UTC m=+0.050775222 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Oct 11 09:10:09 np0005481012 podman[68673]: 2025-10-11 09:10:09.819005683 +0000 UTC m=+0.155001926 container init 8965ad68e86a3e066b96f3bee097aee00850606f98ede844a8a86a28c493050c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, com.redhat.license_terms=https://www.redhat.com/agreements, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, com.redhat.component=openstack-ovn-controller-container, release=1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, vendor=Red Hat, Inc., batch=17.1_20250721.1, vcs-type=git, vcs-ref=f1f0bbd48091f4ceb6d7f5422dfd17725d070245, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, config_id=tripleo_puppet_step1, version=17.1.9, managed_by=tripleo_ansible, tcib_managed=true, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.buildah.version=1.33.12, description=Red Hat OpenStack Platform 17.1 ovn-controller, architecture=x86_64, container_name=container-puppet-ovn_controller, io.openshift.tags=rhosp osp openstack osp-17.1, build-date=2025-07-21T13:28:44, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-ovn-controller/images/17.1.9-1, name=rhosp17/openstack-ovn-controller, summary=Red Hat OpenStack Platform 17.1 ovn-controller) Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Oct 11 09:10:09 np0005481012 podman[68673]: 2025-10-11 09:10:09.826279137 +0000 UTC m=+0.162275350 container start 8965ad68e86a3e066b96f3bee097aee00850606f98ede844a8a86a28c493050c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-ovn-controller/images/17.1.9-1, vcs-ref=f1f0bbd48091f4ceb6d7f5422dfd17725d070245, config_id=tripleo_puppet_step1, container_name=container-puppet-ovn_controller, io.openshift.tags=rhosp osp openstack osp-17.1, vendor=Red Hat, Inc., build-date=2025-07-21T13:28:44, io.buildah.version=1.33.12, batch=17.1_20250721.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, tcib_managed=true, managed_by=tripleo_ansible, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-ovn-controller-container, summary=Red Hat OpenStack Platform 17.1 ovn-controller, architecture=x86_64, release=1, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-type=git, description=Red Hat OpenStack Platform 17.1 ovn-controller, name=rhosp17/openstack-ovn-controller, version=17.1.9, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public) Oct 11 09:10:09 np0005481012 podman[68673]: 2025-10-11 09:10:09.826463803 +0000 UTC m=+0.162460046 container attach 8965ad68e86a3e066b96f3bee097aee00850606f98ede844a8a86a28c493050c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.33.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, build-date=2025-07-21T13:28:44, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1, vcs-ref=f1f0bbd48091f4ceb6d7f5422dfd17725d070245, com.redhat.component=openstack-ovn-controller-container, container_name=container-puppet-ovn_controller, managed_by=tripleo_ansible, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 ovn-controller, version=17.1.9, vendor=Red Hat, Inc., batch=17.1_20250721.1, release=1, name=rhosp17/openstack-ovn-controller, tcib_managed=true, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/agreements, description=Red Hat OpenStack Platform 17.1 ovn-controller, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-ovn-controller/images/17.1.9-1, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, architecture=x86_64) Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/bind_host]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/auth_strategy]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/core_plugin]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/host]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/dns_domain]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/dhcp_agent_notification]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/allow_overlapping_ips]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/global_physnet_mtu]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/vlan_transparent]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron/Neutron_config[agent/root_helper]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron/Neutron_config[agent/report_interval]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/service_plugins]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/auth_url]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/username]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/password]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/project_domain_name]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/project_name]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/user_domain_name]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/region_name]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/endpoint_type]/ensure: created Oct 11 09:10:09 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/auth_type]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/auth_url]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[68026]: Warning: Scope(Apache::Vhost[nova_api_wsgi]): Oct 11 09:10:10 np0005481012 puppet-user[68026]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Oct 11 09:10:10 np0005481012 puppet-user[68026]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Oct 11 09:10:10 np0005481012 puppet-user[68026]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Oct 11 09:10:10 np0005481012 puppet-user[68026]: file names. Oct 11 09:10:10 np0005481012 puppet-user[68026]: Oct 11 09:10:10 np0005481012 puppet-user[68026]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Oct 11 09:10:10 np0005481012 puppet-user[68026]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Oct 11 09:10:10 np0005481012 puppet-user[68026]: sanitized $servername parameter when not explicitly defined. Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/username]/ensure: created Oct 11 09:10:10 np0005481012 systemd[1]: libpod-c9b97ee4b7a578b21ed9512499f6c69aee98fb54abc6ca06e1f05985e0a8addf.scope: Deactivated successfully. Oct 11 09:10:10 np0005481012 systemd[1]: libpod-c9b97ee4b7a578b21ed9512499f6c69aee98fb54abc6ca06e1f05985e0a8addf.scope: Consumed 4.271s CPU time. Oct 11 09:10:10 np0005481012 podman[67762]: 2025-10-11 09:10:10.048521382 +0000 UTC m=+4.552197235 container died c9b97ee4b7a578b21ed9512499f6c69aee98fb54abc6ca06e1f05985e0a8addf (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, architecture=x86_64, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1, summary=Red Hat OpenStack Platform 17.1 mariadb, container_name=container-puppet-mysql, com.redhat.component=openstack-mariadb-container, release=1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, maintainer=OpenStack TripleO Team, build-date=2025-07-21T12:58:45, description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., io.openshift.expose-services=, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, name=rhosp17/openstack-mariadb, distribution-scope=public, version=17.1.9, managed_by=tripleo_ansible, io.buildah.version=1.33.12, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/agreements, batch=17.1_20250721.1, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/password]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/project_domain_name]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/project_name]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/user_domain_name]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/region_name]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/auth_type]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/l3_ha]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/max_l3_agents_per_router]/ensure: created Oct 11 09:10:10 np0005481012 podman[68741]: 2025-10-11 09:10:10.147821783 +0000 UTC m=+0.086348762 container cleanup c9b97ee4b7a578b21ed9512499f6c69aee98fb54abc6ca06e1f05985e0a8addf (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-07-21T12:58:45, name=rhosp17/openstack-mariadb, distribution-scope=public, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, io.buildah.version=1.33.12, release=1, version=17.1.9, container_name=container-puppet-mysql, managed_by=tripleo_ansible, tcib_managed=true, batch=17.1_20250721.1, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/agreements, summary=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, architecture=x86_64, vcs-type=git) Oct 11 09:10:10 np0005481012 systemd[1]: libpod-conmon-c9b97ee4b7a578b21ed9512499f6c69aee98fb54abc6ca06e1f05985e0a8addf.scope: Deactivated successfully. Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/api_workers]/ensure: created Oct 11 09:10:10 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-mysql --conmon-pidfile /run/container-puppet-mysql.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file --env NAME=mysql --env STEP_CONFIG=include ::tripleo::packages#012['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }#012exec {'wait-for-settle': command => '/bin/true' }#012include tripleo::profile::pacemaker::database::mysql_bundle --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-mysql --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-mysql.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/rpc_workers]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/agent_down_time]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/router_scheduler_driver]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 1.81 seconds Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/allow_automatic_l3agent_failover]/ensure: created Oct 11 09:10:10 np0005481012 ovs-vsctl[68773]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server/Neutron_config[ovs/igmp_snooping_enable]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_port]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_security_group]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_network_gateway]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_packet_filter]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2/File[/etc/neutron/plugin.ini]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2/File[/etc/default/neutron-server]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/type_drivers]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/tenant_network_types]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/mechanism_drivers]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/path_mtu]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/extension_drivers]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/overlay_ip_version]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Default[neutron_config]/Neutron_config[DEFAULT/transport_url]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Default[neutron_config]/Neutron_config[DEFAULT/control_exchange]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron/Oslo::Concurrency[neutron_config]/Neutron_config[oslo_concurrency/lock_path]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Notifications[neutron_config]/Neutron_config[oslo_messaging_notifications/driver]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Notifications[neutron_config]/Neutron_config[oslo_messaging_notifications/transport_url]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Rabbit[neutron_config]/Neutron_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Rabbit[neutron_config]/Neutron_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Oct 11 09:10:10 np0005481012 systemd[1]: tmp-crun.6xPH5L.mount: Deactivated successfully. Oct 11 09:10:10 np0005481012 systemd[1]: var-lib-containers-storage-overlay-7f247345f76ad368705853ca1f97c94d0caf917562e17fcbd0b1f3b01c5ba444-merged.mount: Deactivated successfully. Oct 11 09:10:10 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-c9b97ee4b7a578b21ed9512499f6c69aee98fb54abc6ca06e1f05985e0a8addf-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:10 np0005481012 puppet-user[68509]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:10 np0005481012 puppet-user[68509]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:10 np0005481012 puppet-user[68509]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:10 np0005481012 puppet-user[68509]: (file & line not available) Oct 11 09:10:10 np0005481012 puppet-user[68509]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:10 np0005481012 puppet-user[68509]: (file & line not available) Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Logging/Oslo::Log[neutron_config]/Neutron_config[DEFAULT/debug]/ensure: created Oct 11 09:10:10 np0005481012 podman[68876]: 2025-10-11 09:10:10.478071488 +0000 UTC m=+0.054906650 container create 0e99fecfc410c6f7a6d05ce98538fc17821a97d603be581329d2eb1eebdd4616 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, name=rhosp17/openstack-placement-api, architecture=x86_64, com.redhat.component=openstack-placement-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 placement-api, release=1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-07-21T13:58:12, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, tcib_managed=true, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/agreements, summary=Red Hat OpenStack Platform 17.1 placement-api, version=17.1.9, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-placement-api/images/17.1.9-1, io.openshift.tags=rhosp osp openstack osp-17.1, io.openshift.expose-services=, distribution-scope=public, batch=17.1_20250721.1, vcs-ref=9aee5996bfe1f2bd5ce7b36f6b870ad402bd0b67, io.buildah.version=1.33.12, maintainer=OpenStack TripleO Team, container_name=container-puppet-placement, config_id=tripleo_puppet_step1, vcs-type=git) Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Logging/Oslo::Log[neutron_config]/Neutron_config[DEFAULT/log_dir]/ensure: created Oct 11 09:10:10 np0005481012 systemd[1]: Started libpod-conmon-0e99fecfc410c6f7a6d05ce98538fc17821a97d603be581329d2eb1eebdd4616.scope. Oct 11 09:10:10 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:10 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/672752ef08405dd6dda8042eb3b8925bd0a94faafd89185258ff36d634fdc790/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:10 np0005481012 podman[68876]: 2025-10-11 09:10:10.531379487 +0000 UTC m=+0.108214659 container init 0e99fecfc410c6f7a6d05ce98538fc17821a97d603be581329d2eb1eebdd4616 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-placement-api/images/17.1.9-1, name=rhosp17/openstack-placement-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, version=17.1.9, description=Red Hat OpenStack Platform 17.1 placement-api, tcib_managed=true, io.openshift.expose-services=, vendor=Red Hat, Inc., io.buildah.version=1.33.12, vcs-type=git, release=1, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, com.redhat.license_terms=https://www.redhat.com/agreements, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, com.redhat.component=openstack-placement-api-container, io.openshift.tags=rhosp osp openstack osp-17.1, summary=Red Hat OpenStack Platform 17.1 placement-api, build-date=2025-07-21T13:58:12, maintainer=OpenStack TripleO Team, container_name=container-puppet-placement, distribution-scope=public, vcs-ref=9aee5996bfe1f2bd5ce7b36f6b870ad402bd0b67, batch=17.1_20250721.1) Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/www_authenticate_uri]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/auth_type]/ensure: created Oct 11 09:10:10 np0005481012 podman[68876]: 2025-10-11 09:10:10.538758986 +0000 UTC m=+0.115594148 container start 0e99fecfc410c6f7a6d05ce98538fc17821a97d603be581329d2eb1eebdd4616 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, container_name=container-puppet-placement, vendor=Red Hat, Inc., io.buildah.version=1.33.12, com.redhat.component=openstack-placement-api-container, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-placement-api/images/17.1.9-1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 placement-api, vcs-ref=9aee5996bfe1f2bd5ce7b36f6b870ad402bd0b67, vcs-type=git, name=rhosp17/openstack-placement-api, version=17.1.9, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/agreements, managed_by=tripleo_ansible, batch=17.1_20250721.1, io.openshift.tags=rhosp osp openstack osp-17.1, build-date=2025-07-21T13:58:12, tcib_managed=true, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 placement-api, release=1) Oct 11 09:10:10 np0005481012 podman[68876]: 2025-10-11 09:10:10.538938311 +0000 UTC m=+0.115773513 container attach 0e99fecfc410c6f7a6d05ce98538fc17821a97d603be581329d2eb1eebdd4616 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, version=17.1.9, io.buildah.version=1.33.12, io.openshift.expose-services=, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 placement-api, batch=17.1_20250721.1, description=Red Hat OpenStack Platform 17.1 placement-api, architecture=x86_64, maintainer=OpenStack TripleO Team, container_name=container-puppet-placement, vcs-ref=9aee5996bfe1f2bd5ce7b36f6b870ad402bd0b67, vcs-type=git, release=1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, tcib_managed=true, distribution-scope=public, managed_by=tripleo_ansible, name=rhosp17/openstack-placement-api, io.openshift.tags=rhosp osp openstack osp-17.1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-placement-api/images/17.1.9-1, build-date=2025-07-21T13:58:12, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, com.redhat.license_terms=https://www.redhat.com/agreements, com.redhat.component=openstack-placement-api-container) Oct 11 09:10:10 np0005481012 podman[68876]: 2025-10-11 09:10:10.449764123 +0000 UTC m=+0.026599305 image pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/memcached_servers]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/region_name]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/auth_url]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Oct 11 09:10:10 np0005481012 puppet-user[68571]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:10 np0005481012 puppet-user[68571]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:10 np0005481012 puppet-user[68571]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:10 np0005481012 puppet-user[68571]: (file & line not available) Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/username]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/password]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/user_domain_name]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/project_name]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/project_domain_name]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[68571]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:10 np0005481012 puppet-user[68571]: (file & line not available) Oct 11 09:10:10 np0005481012 puppet-user[68509]: Warning: Scope(Class[Nova]): The os_region_name parameter is deprecated and will be removed \ Oct 11 09:10:10 np0005481012 puppet-user[68509]: in a future release. Use nova::cinder::os_region_name instead Oct 11 09:10:10 np0005481012 puppet-user[68509]: Warning: Scope(Class[Nova]): The catalog_info parameter is deprecated and will be removed \ Oct 11 09:10:10 np0005481012 puppet-user[68509]: in a future release. Use nova::cinder::catalog_info instead Oct 11 09:10:10 np0005481012 puppet-user[68509]: Warning: Scope(Class[Nova]): The database_connection parameter is deprecated and will be \ Oct 11 09:10:10 np0005481012 puppet-user[68509]: removed in a future realse. Use nova::db::database_connection instead Oct 11 09:10:10 np0005481012 puppet-user[68509]: Warning: Scope(Class[Nova]): The api_database_connection parameter is deprecated and will be \ Oct 11 09:10:10 np0005481012 puppet-user[68509]: removed in a future realse. Use nova::db::api_database_connection instead Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/interface]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}300c72dc6d6531adc82e8176277b4b32c96c80f2a0f9aaa823ba8c6386bef2e8' Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}4f73037b8196b0bab62c9c1419ef1b40c67b2055f31a8617a1adf8493a295c5b' Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}62d580b7adecb2bd04af6ef451f8bb27291f7dfa5a3d582660b774da9aff158e' Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Oct 11 09:10:10 np0005481012 puppet-user[68571]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 0.07 seconds Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}4f73037b8196b0bab62c9c1419ef1b40c67b2055f31a8617a1adf8493a295c5b' Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Oct 11 09:10:10 np0005481012 puppet-user[68571]: Notice: /Stage[main]/Tripleo::Profile::Base::Logging::Logrotate/File[/etc/logrotate-crond.conf]/ensure: defined content as '{sha256}1c3202f58bd2ae16cb31badcbb7f0d4e6697157b987d1887736ad96bb73d70b0' Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Oct 11 09:10:10 np0005481012 puppet-user[68571]: Notice: /Stage[main]/Tripleo::Profile::Base::Logging::Logrotate/Cron[logrotate-crond]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Oct 11 09:10:10 np0005481012 puppet-user[68571]: Notice: Applied catalog in 0.04 seconds Oct 11 09:10:10 np0005481012 puppet-user[68571]: Application: Oct 11 09:10:10 np0005481012 puppet-user[68571]: Initial environment: production Oct 11 09:10:10 np0005481012 puppet-user[68571]: Converged environment: production Oct 11 09:10:10 np0005481012 puppet-user[68571]: Run mode: user Oct 11 09:10:10 np0005481012 puppet-user[68571]: Changes: Oct 11 09:10:10 np0005481012 puppet-user[68571]: Total: 2 Oct 11 09:10:10 np0005481012 puppet-user[68571]: Events: Oct 11 09:10:10 np0005481012 puppet-user[68571]: Success: 2 Oct 11 09:10:10 np0005481012 puppet-user[68571]: Total: 2 Oct 11 09:10:10 np0005481012 puppet-user[68571]: Resources: Oct 11 09:10:10 np0005481012 puppet-user[68571]: Changed: 2 Oct 11 09:10:10 np0005481012 puppet-user[68571]: Out of sync: 2 Oct 11 09:10:10 np0005481012 puppet-user[68571]: Skipped: 7 Oct 11 09:10:10 np0005481012 puppet-user[68571]: Total: 9 Oct 11 09:10:10 np0005481012 puppet-user[68571]: Time: Oct 11 09:10:10 np0005481012 puppet-user[68571]: File: 0.01 Oct 11 09:10:10 np0005481012 puppet-user[68571]: Cron: 0.01 Oct 11 09:10:10 np0005481012 puppet-user[68571]: Transaction evaluation: 0.04 Oct 11 09:10:10 np0005481012 puppet-user[68571]: Catalog application: 0.04 Oct 11 09:10:10 np0005481012 puppet-user[68571]: Config retrieval: 0.11 Oct 11 09:10:10 np0005481012 puppet-user[68571]: Last run: 1760173810 Oct 11 09:10:10 np0005481012 puppet-user[68571]: Total: 0.04 Oct 11 09:10:10 np0005481012 puppet-user[68571]: Version: Oct 11 09:10:10 np0005481012 puppet-user[68571]: Config: 1760173810 Oct 11 09:10:10 np0005481012 puppet-user[68571]: Puppet: 7.10.0 Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Wsgi::Apache_api/Openstacklib::Wsgi::Apache[nova_api_wsgi]/File[/var/www/cgi-bin/nova]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Wsgi::Apache_api/Openstacklib::Wsgi::Apache[nova_api_wsgi]/File[nova_api_wsgi]/ensure: defined content as '{sha256}901cc9636a87a089b1b6620430d7a36909add0ca7dc2216b74d7bb9dc627d776' Oct 11 09:10:10 np0005481012 puppet-user[68509]: Warning: Unknown variable: '::nova::compute::verify_glance_signatures'. (file: /etc/puppet/modules/nova/manifests/glance.pp, line: 62, column: 41) Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Db/Oslo::Db[neutron_config]/Neutron_config[database/connection]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Db/Oslo::Db[neutron_config]/Neutron_config[database/max_retries]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/ssl_only]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/cert]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Db/Oslo::Db[neutron_config]/Neutron_config[database/db_max_retries]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/key]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Nova_config[console/ssl_minimum_version]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Policy/Oslo::Policy[neutron_config]/Neutron_config[oslo_policy/policy_file]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/my_ip]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Server/Oslo::Middleware[neutron_config]/Neutron_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/host]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[geneve]/Neutron_plugin_ml2[ml2_type_geneve/max_header_size]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[geneve]/Neutron_plugin_ml2[ml2_type_geneve/vni_ranges]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[vxlan]/Neutron_plugin_ml2[ml2_type_vxlan/vxlan_group]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[vxlan]/Neutron_plugin_ml2[ml2_type_vxlan/vni_ranges]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[vlan]/Neutron_plugin_ml2[ml2_type_vlan/network_vlan_ranges]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[flat]/Neutron_plugin_ml2[ml2_type_flat/flat_networks]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_connection]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_connection]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_private_key]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_certificate]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_ca_cert]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_private_key]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_certificate]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_ca_cert]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovsdb_connection_timeout]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovsdb_probe_interval]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/neutron_sync_mode]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_metadata_enabled]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/enable_distributed_floating_ip]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/dns_servers]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_emit_need_to_frag]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[network_log/rate_limit]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[network_log/burst_limit]/ensure: created Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Oct 11 09:10:10 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/dhcp_domain]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Oct 11 09:10:11 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Oct 11 09:10:11 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Oct 11 09:10:11 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Oct 11 09:10:11 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Oct 11 09:10:11 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Oct 11 09:10:11 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Oct 11 09:10:11 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Oct 11 09:10:11 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Oct 11 09:10:11 np0005481012 systemd[1]: libpod-33733e069b969a2c0b2ea4d6d31f39e7ecee4c7a32d208f21011a73caed83f10.scope: Deactivated successfully. Oct 11 09:10:11 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Oct 11 09:10:11 np0005481012 systemd[1]: libpod-33733e069b969a2c0b2ea4d6d31f39e7ecee4c7a32d208f21011a73caed83f10.scope: Consumed 2.108s CPU time. Oct 11 09:10:11 np0005481012 podman[68542]: 2025-10-11 09:10:11.034129898 +0000 UTC m=+2.414567766 container died 33733e069b969a2c0b2ea4d6d31f39e7ecee4c7a32d208f21011a73caed83f10 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, tcib_managed=true, io.openshift.expose-services=, vendor=Red Hat, Inc., distribution-scope=public, config_id=tripleo_puppet_step1, build-date=2025-07-21T13:07:52, architecture=x86_64, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 cron, container_name=container-puppet-crond, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-cron/images/17.1.9-1, com.redhat.component=openstack-cron-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.33.12, name=rhosp17/openstack-cron, com.redhat.license_terms=https://www.redhat.com/agreements, release=1, io.openshift.tags=rhosp osp openstack osp-17.1, maintainer=OpenStack TripleO Team, version=17.1.9, vcs-ref=1cbdeb2f9fe67da66c8007dc1c7f4220cefddf6c, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, batch=17.1_20250721.1, io.k8s.description=Red Hat OpenStack Platform 17.1 cron) Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Nova_config[vif_plug_ovs/ovsdb_connection]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[67905]: Notice: /Stage[main]/Tripleo::Profile::Base::Neutron::Server/Tripleo::Tls_proxy[neutron-api]/Apache::Vhost[neutron-api-proxy]/Concat[25-neutron-api-proxy.conf]/File[/etc/httpd/conf.d/25-neutron-api-proxy.conf]/ensure: defined content as '{sha256}3aafe90adc64464c6314c6bef6e1db47a94e483ef02a2c27b9424001cca5fe7e' Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Nova_config[notifications/notification_format]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/state_path]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/service_down_time]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/rootwrap_config]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[67905]: Notice: Applied catalog in 1.41 seconds Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/report_interval]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Nova_config[notifications/notify_on_state_change]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Nova_config[cinder/cross_az_attach]/ensure: created Oct 11 09:10:11 np0005481012 podman[69002]: 2025-10-11 09:10:11.12472547 +0000 UTC m=+0.085452995 container cleanup 33733e069b969a2c0b2ea4d6d31f39e7ecee4c7a32d208f21011a73caed83f10 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, build-date=2025-07-21T13:07:52, io.buildah.version=1.33.12, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-cron-container, summary=Red Hat OpenStack Platform 17.1 cron, architecture=x86_64, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, vcs-ref=1cbdeb2f9fe67da66c8007dc1c7f4220cefddf6c, vcs-type=git, batch=17.1_20250721.1, container_name=container-puppet-crond, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-cron/images/17.1.9-1, vendor=Red Hat, Inc., release=1, com.redhat.license_terms=https://www.redhat.com/agreements, name=rhosp17/openstack-cron, version=17.1.9, description=Red Hat OpenStack Platform 17.1 cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron) Oct 11 09:10:11 np0005481012 systemd[1]: libpod-conmon-33733e069b969a2c0b2ea4d6d31f39e7ecee4c7a32d208f21011a73caed83f10.scope: Deactivated successfully. Oct 11 09:10:11 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-crond --conmon-pidfile /run/container-puppet-crond.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron --env NAME=crond --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::logging::logrotate --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-crond --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-crond.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Application: Oct 11 09:10:11 np0005481012 puppet-user[67905]: Initial environment: production Oct 11 09:10:11 np0005481012 puppet-user[67905]: Converged environment: production Oct 11 09:10:11 np0005481012 puppet-user[67905]: Run mode: user Oct 11 09:10:11 np0005481012 puppet-user[67905]: Changes: Oct 11 09:10:11 np0005481012 puppet-user[67905]: Total: 137 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Events: Oct 11 09:10:11 np0005481012 puppet-user[67905]: Success: 137 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Total: 137 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Resources: Oct 11 09:10:11 np0005481012 puppet-user[67905]: Changed: 137 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Out of sync: 137 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Skipped: 42 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Total: 385 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Time: Oct 11 09:10:11 np0005481012 puppet-user[67905]: Resources: 0.00 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Concat file: 0.00 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Concat fragment: 0.00 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Augeas: 0.02 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Package: 0.04 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Neutron plugin ml2: 0.06 Oct 11 09:10:11 np0005481012 puppet-user[67905]: File: 0.13 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Neutron config: 0.85 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Transaction evaluation: 1.39 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Catalog application: 1.41 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Last run: 1760173811 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Config retrieval: 2.06 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Total: 1.41 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Version: Oct 11 09:10:11 np0005481012 puppet-user[67905]: Config: 1760173807 Oct 11 09:10:11 np0005481012 puppet-user[67905]: Puppet: 7.10.0 Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Glance/Nova_config[glance/valid_interfaces]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_type]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_url]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/password]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_domain_name]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_name]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/user_domain_name]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/username]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/region_name]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/valid_interfaces]/ensure: created Oct 11 09:10:11 np0005481012 systemd[1]: var-lib-containers-storage-overlay-62e1d4e35a0cc5d94d3b28bc0b8640ee6a2ee7d176953912bc6ddd7e3650f0bf-merged.mount: Deactivated successfully. Oct 11 09:10:11 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-33733e069b969a2c0b2ea4d6d31f39e7ecee4c7a32d208f21011a73caed83f10-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/instance_name_template]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/enabled_apis]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Api/Nova_config[wsgi/api_paste_config]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/osapi_compute_listen]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/osapi_compute_listen_port]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/osapi_compute_workers]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Api/Nova_config[api/use_forwarded_for]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Api/Nova_config[api/max_limit]/ensure: created Oct 11 09:10:11 np0005481012 podman[69068]: 2025-10-11 09:10:11.482576409 +0000 UTC m=+0.071922986 container create 17af7935f873dc0b83c763123b5c8167d762c9263c6320ebb488f7479f3a00d3 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, container_name=container-puppet-rabbitmq, config_id=tripleo_puppet_step1, vcs-type=git, com.redhat.component=openstack-rabbitmq-container, distribution-scope=public, vendor=Red Hat, Inc., name=rhosp17/openstack-rabbitmq, io.buildah.version=1.33.12, description=Red Hat OpenStack Platform 17.1 rabbitmq, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-rabbitmq/images/17.1.9-1, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, version=17.1.9, com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.tags=rhosp osp openstack osp-17.1, tcib_managed=true, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, batch=17.1_20250721.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-07-21T13:08:05, release=1, vcs-ref=b30dae4cd2f9a99467af45e3d985bc71318ed98b, architecture=x86_64) Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/allow_resize_to_same_host]/ensure: created Oct 11 09:10:11 np0005481012 systemd[1]: Started libpod-conmon-17af7935f873dc0b83c763123b5c8167d762c9263c6320ebb488f7479f3a00d3.scope. Oct 11 09:10:11 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:11 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/55f94aaa97e04e96fe5c2adacffb81e37f2f86103a2bbe2fb85cc558e316b2b7/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:11 np0005481012 podman[69068]: 2025-10-11 09:10:11.442925052 +0000 UTC m=+0.032271639 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Oct 11 09:10:11 np0005481012 podman[69068]: 2025-10-11 09:10:11.551144749 +0000 UTC m=+0.140491316 container init 17af7935f873dc0b83c763123b5c8167d762c9263c6320ebb488f7479f3a00d3 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, version=17.1.9, com.redhat.component=openstack-rabbitmq-container, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.license_terms=https://www.redhat.com/agreements, container_name=container-puppet-rabbitmq, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-rabbitmq/images/17.1.9-1, io.buildah.version=1.33.12, tcib_managed=true, vcs-ref=b30dae4cd2f9a99467af45e3d985bc71318ed98b, maintainer=OpenStack TripleO Team, build-date=2025-07-21T13:08:05, vendor=Red Hat, Inc., release=1, architecture=x86_64, batch=17.1_20250721.1, io.openshift.tags=rhosp osp openstack osp-17.1, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-rabbitmq, distribution-scope=public, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, config_id=tripleo_puppet_step1, vcs-type=git, description=Red Hat OpenStack Platform 17.1 rabbitmq) Oct 11 09:10:11 np0005481012 podman[69068]: 2025-10-11 09:10:11.56117966 +0000 UTC m=+0.150526227 container start 17af7935f873dc0b83c763123b5c8167d762c9263c6320ebb488f7479f3a00d3 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-rabbitmq/images/17.1.9-1, com.redhat.component=openstack-rabbitmq-container, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-type=git, io.buildah.version=1.33.12, description=Red Hat OpenStack Platform 17.1 rabbitmq, build-date=2025-07-21T13:08:05, release=1, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, config_id=tripleo_puppet_step1, container_name=container-puppet-rabbitmq, managed_by=tripleo_ansible, batch=17.1_20250721.1, tcib_managed=true, version=17.1.9, name=rhosp17/openstack-rabbitmq, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-ref=b30dae4cd2f9a99467af45e3d985bc71318ed98b) Oct 11 09:10:11 np0005481012 podman[69068]: 2025-10-11 09:10:11.561379386 +0000 UTC m=+0.150725983 container attach 17af7935f873dc0b83c763123b5c8167d762c9263c6320ebb488f7479f3a00d3 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, vcs-ref=b30dae4cd2f9a99467af45e3d985bc71318ed98b, architecture=x86_64, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/agreements, managed_by=tripleo_ansible, build-date=2025-07-21T13:08:05, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1, config_id=tripleo_puppet_step1, vcs-type=git, description=Red Hat OpenStack Platform 17.1 rabbitmq, version=17.1.9, release=1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, batch=17.1_20250721.1, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, tcib_managed=true, name=rhosp17/openstack-rabbitmq, com.redhat.component=openstack-rabbitmq-container, container_name=container-puppet-rabbitmq, io.buildah.version=1.33.12, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-rabbitmq/images/17.1.9-1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, vendor=Red Hat, Inc.) Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_is_fatal]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_timeout]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/default_floating_pool]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/timeout]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_name]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_domain_name]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/region_name]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/username]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68712]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:11 np0005481012 puppet-user[68712]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:11 np0005481012 puppet-user[68712]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:11 np0005481012 puppet-user[68712]: (file & line not available) Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/user_domain_name]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/password]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68712]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:11 np0005481012 puppet-user[68712]: (file & line not available) Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_url]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/valid_interfaces]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/ovs_bridge]/ensure: created Oct 11 09:10:11 np0005481012 systemd[1]: libpod-668776c563e1f3774bfd81afbb61bd39612ba3d87113b5493e5ebe92faec8bbf.scope: Deactivated successfully. Oct 11 09:10:11 np0005481012 systemd[1]: libpod-668776c563e1f3774bfd81afbb61bd39612ba3d87113b5493e5ebe92faec8bbf.scope: Consumed 5.719s CPU time. Oct 11 09:10:11 np0005481012 podman[67860]: 2025-10-11 09:10:11.800819162 +0000 UTC m=+6.170674767 container died 668776c563e1f3774bfd81afbb61bd39612ba3d87113b5493e5ebe92faec8bbf (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, batch=17.1_20250721.1, version=17.1.9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, tcib_managed=true, distribution-scope=public, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/agreements, description=Red Hat OpenStack Platform 17.1 neutron-server, architecture=x86_64, vendor=Red Hat, Inc., name=rhosp17/openstack-neutron-server, managed_by=tripleo_ansible, build-date=2025-07-21T15:44:03, container_name=container-puppet-neutron, io.buildah.version=1.33.12, vcs-type=git, release=1, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container, vcs-ref=a2a5d3babd6b02c0b20df6d01cd606fef9bdf69d, io.openshift.tags=rhosp osp openstack osp-17.1, summary=Red Hat OpenStack Platform 17.1 neutron-server, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-neutron-server/images/17.1.9-1, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/extension_sync_interval]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_type]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68509]: Warning: Scope(Apache::Vhost[nova_metadata_wsgi]): Oct 11 09:10:11 np0005481012 puppet-user[68509]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Oct 11 09:10:11 np0005481012 puppet-user[68509]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Oct 11 09:10:11 np0005481012 puppet-user[68509]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Oct 11 09:10:11 np0005481012 puppet-user[68509]: file names. Oct 11 09:10:11 np0005481012 puppet-user[68509]: Oct 11 09:10:11 np0005481012 puppet-user[68509]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Oct 11 09:10:11 np0005481012 puppet-user[68509]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Oct 11 09:10:11 np0005481012 puppet-user[68509]: sanitized $servername parameter when not explicitly defined. Oct 11 09:10:11 np0005481012 podman[69193]: 2025-10-11 09:10:11.883431638 +0000 UTC m=+0.073176965 container cleanup 668776c563e1f3774bfd81afbb61bd39612ba3d87113b5493e5ebe92faec8bbf (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, name=rhosp17/openstack-neutron-server, io.openshift.expose-services=, release=1, vcs-ref=a2a5d3babd6b02c0b20df6d01cd606fef9bdf69d, vendor=Red Hat, Inc., distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-neutron-server/images/17.1.9-1, com.redhat.component=openstack-neutron-server-container, version=17.1.9, description=Red Hat OpenStack Platform 17.1 neutron-server, summary=Red Hat OpenStack Platform 17.1 neutron-server, managed_by=tripleo_ansible, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/agreements, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, build-date=2025-07-21T15:44:03, batch=17.1_20250721.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.33.12, architecture=x86_64, container_name=container-puppet-neutron) Oct 11 09:10:11 np0005481012 systemd[1]: libpod-conmon-668776c563e1f3774bfd81afbb61bd39612ba3d87113b5493e5ebe92faec8bbf.scope: Deactivated successfully. Oct 11 09:10:11 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-neutron --conmon-pidfile /run/container-puppet-neutron.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2 --env NAME=neutron --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::neutron::server#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::neutron::plugins::ml2#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-neutron --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-neutron.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/project_domain_name]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68712]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 0.25 seconds Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/user_domain_name]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Conductor/Nova_config[conductor/workers]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/workers]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68509]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 1.61 seconds Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/discover_hosts_in_cells_interval]/ensure: created Oct 11 09:10:11 np0005481012 ovs-vsctl[69223]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:172.17.0.103:6642,ssl:172.17.0.104:6642,ssl:172.17.0.105:6642 Oct 11 09:10:11 np0005481012 puppet-user[68712]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-remote]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/query_placement_for_image_type_support]/ensure: created Oct 11 09:10:11 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/limit_tenants_to_placement_aggregate]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/placement_aggregate_required_for_tenants]/ensure: created Oct 11 09:10:12 np0005481012 ovs-vsctl[69229]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Oct 11 09:10:12 np0005481012 puppet-user[68712]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-encap-type]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/enable_isolated_aggregate_filtering]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/query_placement_for_availability_zone]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/query_placement_for_routed_network_aggregates]/ensure: created Oct 11 09:10:12 np0005481012 ovs-vsctl[69238]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=172.19.0.103 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-encap-ip]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Scheduler::Filter/Nova_config[filter_scheduler/host_subset_size]/ensure: created Oct 11 09:10:12 np0005481012 ovs-vsctl[69246]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005481012.ooo.test Oct 11 09:10:12 np0005481012 puppet-user[68712]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:hostname]/value: value changed 'np0005481012.novalocal' to 'np0005481012.ooo.test' Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Scheduler::Filter/Nova_config[filter_scheduler/weight_classes]/ensure: created Oct 11 09:10:12 np0005481012 ovs-vsctl[69255]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Oct 11 09:10:12 np0005481012 puppet-user[68712]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-bridge]/ensure: created Oct 11 09:10:12 np0005481012 ovs-vsctl[69260]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-remote-probe-interval]/ensure: created Oct 11 09:10:12 np0005481012 ovs-vsctl[69264]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-openflow-probe-interval=60 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-openflow-probe-interval]/ensure: created Oct 11 09:10:12 np0005481012 ovs-vsctl[69273]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=true Oct 11 09:10:12 np0005481012 puppet-user[68712]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-monitor-all]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Scheduler::Filter/Nova_config[filter_scheduler/shuffle_best_same_weighed_hosts]/ensure: created Oct 11 09:10:12 np0005481012 ovs-vsctl[69281]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-ofctrl-wait-before-clear]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/vencrypt_ca_certs]/ensure: created Oct 11 09:10:12 np0005481012 ovs-vsctl[69287]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-tos=0 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-encap-tos]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/vencrypt_client_cert]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/vencrypt_client_key]/ensure: created Oct 11 09:10:12 np0005481012 ovs-vsctl[69291]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-chassis-mac-mappings=datacentre:fa:16:3e:29:8c:fa Oct 11 09:10:12 np0005481012 podman[69275]: 2025-10-11 09:10:12.249793479 +0000 UTC m=+0.061611497 container create cd0e1b6c5bfd8644a34dbbbd5d13f4825243f1fd66d1688b2f34acff4a2f4a34 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, io.buildah.version=1.33.12, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 redis, tcib_managed=true, name=rhosp17/openstack-redis, build-date=2025-07-21T13:10:13, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-type=git, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, container_name=container-puppet-redis, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, vendor=Red Hat, Inc., vcs-ref=ff6161246d28f7887060a5133e281d72aa432576, io.openshift.expose-services=, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-redis/images/17.1.9-1, batch=17.1_20250721.1, io.openshift.tags=rhosp osp openstack osp-17.1, distribution-scope=public, version=17.1.9, summary=Red Hat OpenStack Platform 17.1 redis, architecture=x86_64, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-redis-container, release=1) Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/novncproxy_host]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/novncproxy_port]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68712]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-chassis-mac-mappings]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/auth_schemes]/ensure: created Oct 11 09:10:12 np0005481012 systemd[1]: Started libpod-conmon-cd0e1b6c5bfd8644a34dbbbd5d13f4825243f1fd66d1688b2f34acff4a2f4a34.scope. Oct 11 09:10:12 np0005481012 ovs-vsctl[69296]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=datacentre:br-ex Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/debug]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68712]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-bridge-mappings]/ensure: created Oct 11 09:10:12 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:12 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/da40f2901d4d2c97d4fc3d49c3fe5693905483134a3033990c9b4ba33101a90f/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:12 np0005481012 podman[69275]: 2025-10-11 09:10:12.296200205 +0000 UTC m=+0.108018253 container init cd0e1b6c5bfd8644a34dbbbd5d13f4825243f1fd66d1688b2f34acff4a2f4a34 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, release=1, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/agreements, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, summary=Red Hat OpenStack Platform 17.1 redis, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-redis/images/17.1.9-1, io.openshift.tags=rhosp osp openstack osp-17.1, version=17.1.9, distribution-scope=public, io.openshift.expose-services=, io.buildah.version=1.33.12, architecture=x86_64, tcib_managed=true, managed_by=tripleo_ansible, vcs-type=git, batch=17.1_20250721.1, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-redis, build-date=2025-07-21T13:10:13, vcs-ref=ff6161246d28f7887060a5133e281d72aa432576, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 redis, com.redhat.component=openstack-redis-container, container_name=container-puppet-redis) Oct 11 09:10:12 np0005481012 ovs-vsctl[69301]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Oct 11 09:10:12 np0005481012 podman[69275]: 2025-10-11 09:10:12.305126591 +0000 UTC m=+0.116944599 container start cd0e1b6c5bfd8644a34dbbbd5d13f4825243f1fd66d1688b2f34acff4a2f4a34 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, distribution-scope=public, batch=17.1_20250721.1, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, com.redhat.component=openstack-redis-container, tcib_managed=true, build-date=2025-07-21T13:10:13, release=1, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 redis, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1, version=17.1.9, io.buildah.version=1.33.12, managed_by=tripleo_ansible, vcs-ref=ff6161246d28f7887060a5133e281d72aa432576, com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 redis, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-redis, container_name=container-puppet-redis, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, vcs-type=git, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-redis/images/17.1.9-1) Oct 11 09:10:12 np0005481012 podman[69275]: 2025-10-11 09:10:12.305295926 +0000 UTC m=+0.117113944 container attach cd0e1b6c5bfd8644a34dbbbd5d13f4825243f1fd66d1688b2f34acff4a2f4a34 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, container_name=container-puppet-redis, name=rhosp17/openstack-redis, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, release=1, version=17.1.9, io.openshift.expose-services=, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 redis, io.buildah.version=1.33.12, vcs-ref=ff6161246d28f7887060a5133e281d72aa432576, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20250721.1, com.redhat.component=openstack-redis-container, io.openshift.tags=rhosp osp openstack osp-17.1, architecture=x86_64, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 redis, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/agreements, build-date=2025-07-21T13:10:13, vendor=Red Hat, Inc., managed_by=tripleo_ansible, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-redis/images/17.1.9-1) Oct 11 09:10:12 np0005481012 puppet-user[68712]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-match-northd-version]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/log_dir]/ensure: created Oct 11 09:10:12 np0005481012 ovs-vsctl[69319]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:garp-max-timeout-sec=0 Oct 11 09:10:12 np0005481012 podman[69275]: 2025-10-11 09:10:12.221481173 +0000 UTC m=+0.033299211 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:garp-max-timeout-sec]/ensure: created Oct 11 09:10:12 np0005481012 systemd[1]: var-lib-containers-storage-overlay-8b714ffcf836fb0ab9468ef016e95a2ffb5d4bf9c72ce776dfa28e0b49cfe5e1-merged.mount: Deactivated successfully. Oct 11 09:10:12 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-668776c563e1f3774bfd81afbb61bd39612ba3d87113b5493e5ebe92faec8bbf-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Oct 11 09:10:12 np0005481012 puppet-user[68712]: Notice: Applied catalog in 0.42 seconds Oct 11 09:10:12 np0005481012 puppet-user[68712]: Application: Oct 11 09:10:12 np0005481012 puppet-user[68712]: Initial environment: production Oct 11 09:10:12 np0005481012 puppet-user[68712]: Converged environment: production Oct 11 09:10:12 np0005481012 puppet-user[68712]: Run mode: user Oct 11 09:10:12 np0005481012 puppet-user[68712]: Changes: Oct 11 09:10:12 np0005481012 puppet-user[68712]: Total: 14 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Events: Oct 11 09:10:12 np0005481012 puppet-user[68712]: Success: 14 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Total: 14 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Resources: Oct 11 09:10:12 np0005481012 puppet-user[68712]: Skipped: 12 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Changed: 14 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Out of sync: 14 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Total: 29 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Time: Oct 11 09:10:12 np0005481012 puppet-user[68712]: Exec: 0.02 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Config retrieval: 0.28 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Vs config: 0.36 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Transaction evaluation: 0.42 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Catalog application: 0.42 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Last run: 1760173812 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Total: 0.42 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Version: Oct 11 09:10:12 np0005481012 puppet-user[68712]: Config: 1760173811 Oct 11 09:10:12 np0005481012 puppet-user[68712]: Puppet: 7.10.0 Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Oct 11 09:10:12 np0005481012 puppet-user[68954]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:12 np0005481012 puppet-user[68954]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:12 np0005481012 puppet-user[68954]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:12 np0005481012 puppet-user[68954]: (file & line not available) Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}b9623034a6caf6171943ab6ba3663f20682025983716dbd50aac8d15ef7fe459' Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}4f73037b8196b0bab62c9c1419ef1b40c67b2055f31a8617a1adf8493a295c5b' Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Oct 11 09:10:12 np0005481012 puppet-user[68954]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Oct 11 09:10:12 np0005481012 puppet-user[68954]: (file & line not available) Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/backend]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/enabled]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/memcache_servers]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/ssl_only]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/tls_enabled]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/cert]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/key]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Nova_config[console/ssl_minimum_version]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/my_ip]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/host]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/dhcp_domain]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Nova_config[vif_plug_ovs/ovsdb_connection]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Nova_config[notifications/notification_format]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/state_path]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/ssl]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/service_down_time]/ensure: created Oct 11 09:10:12 np0005481012 systemd[1]: libpod-8965ad68e86a3e066b96f3bee097aee00850606f98ede844a8a86a28c493050c.scope: Deactivated successfully. Oct 11 09:10:12 np0005481012 systemd[1]: libpod-8965ad68e86a3e066b96f3bee097aee00850606f98ede844a8a86a28c493050c.scope: Consumed 2.813s CPU time. Oct 11 09:10:12 np0005481012 podman[68673]: 2025-10-11 09:10:12.750762604 +0000 UTC m=+3.086758807 container died 8965ad68e86a3e066b96f3bee097aee00850606f98ede844a8a86a28c493050c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, name=rhosp17/openstack-ovn-controller, container_name=container-puppet-ovn_controller, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/agreements, build-date=2025-07-21T13:28:44, release=1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, io.buildah.version=1.33.12, vendor=Red Hat, Inc., vcs-type=git, batch=17.1_20250721.1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-ovn-controller/images/17.1.9-1, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, com.redhat.component=openstack-ovn-controller-container, config_id=tripleo_puppet_step1, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-ref=f1f0bbd48091f4ceb6d7f5422dfd17725d070245, architecture=x86_64, version=17.1.9, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1, description=Red Hat OpenStack Platform 17.1 ovn-controller) Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/rootwrap_config]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/report_interval]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Nova_config[notifications/notify_on_state_change]/ensure: created Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Nova_config[cinder/cross_az_attach]/ensure: created Oct 11 09:10:12 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-8965ad68e86a3e066b96f3bee097aee00850606f98ede844a8a86a28c493050c-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:12 np0005481012 systemd[1]: var-lib-containers-storage-overlay-b7cc74a80005a9560d765d3fb168bb0428c40a542fd998bcc7d15e303d36f6a6-merged.mount: Deactivated successfully. Oct 11 09:10:12 np0005481012 podman[69423]: 2025-10-11 09:10:12.863083169 +0000 UTC m=+0.098106696 container cleanup 8965ad68e86a3e066b96f3bee097aee00850606f98ede844a8a86a28c493050c (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, config_id=tripleo_puppet_step1, architecture=x86_64, name=rhosp17/openstack-ovn-controller, release=1, vcs-ref=f1f0bbd48091f4ceb6d7f5422dfd17725d070245, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, vendor=Red Hat, Inc., build-date=2025-07-21T13:28:44, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-ovn-controller/images/17.1.9-1, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, managed_by=tripleo_ansible, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 ovn-controller, com.redhat.license_terms=https://www.redhat.com/agreements, io.buildah.version=1.33.12, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-ovn-controller-container, container_name=container-puppet-ovn_controller, io.openshift.tags=rhosp osp openstack osp-17.1, vcs-type=git, batch=17.1_20250721.1, version=17.1.9, description=Red Hat OpenStack Platform 17.1 ovn-controller) Oct 11 09:10:12 np0005481012 systemd[1]: libpod-conmon-8965ad68e86a3e066b96f3bee097aee00850606f98ede844a8a86a28c493050c.scope: Deactivated successfully. Oct 11 09:10:12 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-ovn_controller --conmon-pidfile /run/container-puppet-ovn_controller.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,vs_config,exec --env NAME=ovn_controller --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::neutron::agents::ovn#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-ovn_controller --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-ovn_controller.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /etc/sysconfig/modules:/etc/sysconfig/modules --volume /lib/modules:/lib/modules:ro --volume /run/openvswitch:/run/openvswitch:shared,z --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Oct 11 09:10:12 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Glance/Nova_config[glance/valid_interfaces]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_type]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Oslo::Messaging::Default[nova_config]/Nova_config[DEFAULT/transport_url]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_url]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/driver]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/password]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_domain_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/user_domain_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/username]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/region_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/valid_interfaces]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_is_fatal]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/transport_url]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_timeout]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/default_floating_pool]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/timeout]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_domain_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/region_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/username]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova/Oslo::Concurrency[nova_config]/Nova_config[oslo_concurrency/lock_path]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/user_domain_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_type]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/password]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_url]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/valid_interfaces]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/region_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/ovs_bridge]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/extension_sync_interval]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_url]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_type]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/username]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/password]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/user_domain_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Metadata/Nova_config[api/local_metadata_per_cell]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Metadata/Nova_config[neutron/service_metadata_proxy]/ensure: created Oct 11 09:10:13 np0005481012 podman[69487]: 2025-10-11 09:10:13.291844731 +0000 UTC m=+0.076624361 container create 7085b252102396761cde22353327712192d50c675e6d2304d37ca9d5770dcd42 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1, distribution-scope=public, tcib_managed=true, maintainer=OpenStack TripleO Team, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, description=Red Hat OpenStack Platform 17.1 rsyslog, summary=Red Hat OpenStack Platform 17.1 rsyslog, name=rhosp17/openstack-rsyslog, version=17.1.9, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, io.buildah.version=1.33.12, batch=17.1_20250721.1, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/agreements, com.redhat.component=openstack-rsyslog-container, release=1, container_name=container-puppet-rsyslog, build-date=2025-07-21T12:58:40, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, vcs-ref=38a223d7b691af709e0a5f628409462e34eea167, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-rsyslog/images/17.1.9-1) Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_domain_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Metadata/Nova_config[neutron/metadata_proxy_shared_secret]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/send_service_user_token]/ensure: created Oct 11 09:10:13 np0005481012 systemd[1]: Started libpod-conmon-7085b252102396761cde22353327712192d50c675e6d2304d37ca9d5770dcd42.scope. Oct 11 09:10:13 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:13 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/3d6a159c785ad62010c6e05527242734146fa0f5fe7521143f6b8a4ed6961896/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/www_authenticate_uri]/ensure: created Oct 11 09:10:13 np0005481012 podman[69487]: 2025-10-11 09:10:13.335246964 +0000 UTC m=+0.120026574 container init 7085b252102396761cde22353327712192d50c675e6d2304d37ca9d5770dcd42 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/agreements, com.redhat.component=openstack-rsyslog-container, release=1, container_name=container-puppet-rsyslog, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-rsyslog/images/17.1.9-1, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 rsyslog, build-date=2025-07-21T12:58:40, summary=Red Hat OpenStack Platform 17.1 rsyslog, batch=17.1_20250721.1, name=rhosp17/openstack-rsyslog, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, version=17.1.9, architecture=x86_64, vcs-type=git, vcs-ref=38a223d7b691af709e0a5f628409462e34eea167, io.buildah.version=1.33.12, io.openshift.tags=rhosp osp openstack osp-17.1, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog) Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_type]/ensure: created Oct 11 09:10:13 np0005481012 podman[69487]: 2025-10-11 09:10:13.347326457 +0000 UTC m=+0.132106097 container start 7085b252102396761cde22353327712192d50c675e6d2304d37ca9d5770dcd42 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-rsyslog/images/17.1.9-1, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 rsyslog, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1, summary=Red Hat OpenStack Platform 17.1 rsyslog, vcs-type=git, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-rsyslog, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, io.buildah.version=1.33.12, batch=17.1_20250721.1, container_name=container-puppet-rsyslog, version=17.1.9, vcs-ref=38a223d7b691af709e0a5f628409462e34eea167, build-date=2025-07-21T12:58:40, config_id=tripleo_puppet_step1, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/agreements, release=1, com.redhat.component=openstack-rsyslog-container, architecture=x86_64) Oct 11 09:10:13 np0005481012 podman[69487]: 2025-10-11 09:10:13.347599365 +0000 UTC m=+0.132378985 container attach 7085b252102396761cde22353327712192d50c675e6d2304d37ca9d5770dcd42 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, container_name=container-puppet-rsyslog, vendor=Red Hat, Inc., build-date=2025-07-21T12:58:40, managed_by=tripleo_ansible, io.buildah.version=1.33.12, distribution-scope=public, version=17.1.9, architecture=x86_64, release=1, name=rhosp17/openstack-rsyslog, description=Red Hat OpenStack Platform 17.1 rsyslog, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-rsyslog/images/17.1.9-1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, batch=17.1_20250721.1, com.redhat.component=openstack-rsyslog-container, vcs-ref=38a223d7b691af709e0a5f628409462e34eea167, io.openshift.tags=rhosp osp openstack osp-17.1, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 rsyslog, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/agreements) Oct 11 09:10:13 np0005481012 podman[69487]: 2025-10-11 09:10:13.250114411 +0000 UTC m=+0.034894121 image pull registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/project_domain_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/user_domain_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/debug]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Warning: Scope(Apache::Vhost[placement_wsgi]): Oct 11 09:10:13 np0005481012 puppet-user[68954]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Oct 11 09:10:13 np0005481012 puppet-user[68954]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Oct 11 09:10:13 np0005481012 puppet-user[68954]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Oct 11 09:10:13 np0005481012 puppet-user[68954]: file names. Oct 11 09:10:13 np0005481012 puppet-user[68954]: Oct 11 09:10:13 np0005481012 puppet-user[68954]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Oct 11 09:10:13 np0005481012 puppet-user[68954]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Oct 11 09:10:13 np0005481012 puppet-user[68954]: sanitized $servername parameter when not explicitly defined. Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/log_dir]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcached_servers]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/region_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_url]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/username]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/password]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/user_domain_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 1.16 seconds Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_domain_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/interface]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/connection]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/max_retries]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/backend]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/enabled]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/db_max_retries]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/memcache_servers]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Db/Oslo::Db[api_database]/Nova_config[api_database/connection]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/tls_enabled]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Logging/Oslo::Log[placement_config]/Placement_config[DEFAULT/debug]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Logging/Oslo::Log[placement_config]/Placement_config[DEFAULT/log_file]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Logging/Oslo::Log[placement_config]/Placement_config[DEFAULT/log_dir]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Db/Oslo::Db[placement_config]/Placement_config[placement_database/connection]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/www_authenticate_uri]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/auth_type]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Policy/Oslo::Policy[nova_config]/Nova_config[oslo_policy/enforce_scope]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Policy/Oslo::Policy[nova_config]/Nova_config[oslo_policy/enforce_new_defaults]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Policy/Oslo::Policy[nova_config]/Nova_config[oslo_policy/policy_file]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/memcached_servers]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/region_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/auth_url]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/username]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/password]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/user_domain_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/project_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/project_domain_name]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/interface]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Api/Oslo::Middleware[nova_config]/Nova_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}6b9e264b98904ed2b91698acece035be22dc961ad94895907d4f82a66e7e2c6a' Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}4f73037b8196b0bab62c9c1419ef1b40c67b2055f31a8617a1adf8493a295c5b' Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Oct 11 09:10:13 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/ssl]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Policy/Oslo::Policy[placement_config]/Placement_config[oslo_policy/enforce_scope]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Policy/Oslo::Policy[placement_config]/Placement_config[oslo_policy/enforce_new_defaults]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Policy/Oslo::Policy[placement_config]/Placement_config[oslo_policy/policy_file]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Cron::Archive_deleted_rows/Cron[nova-manage db archive_deleted_rows]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Wsgi::Apache/File[/etc/httpd/conf.d/00-placement-api.conf]/content: content changed '{sha256}829e74856246ff8f4a56a4995cd421edd210e3c0342c998de9e934d33c2d229f' to '{sha256}a742a33fca7bd0225b70d9c9c3f9977f3f5b1391a7c4db389c2e405e7a0e7ecc' Oct 11 09:10:14 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Cron::Purge_shadow_tables/Cron[nova-manage db purge]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Wsgi::Apache/Openstacklib::Wsgi::Apache[placement_wsgi]/File[/var/www/cgi-bin/placement]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Wsgi::Apache/Openstacklib::Wsgi::Apache[placement_wsgi]/File[placement_wsgi]/ensure: defined content as '{sha256}7330573e2f484b77671e7cd10bec4bf8fe4471ba5a127b8362286c6c89a050fe' Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Oct 11 09:10:14 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Oct 11 09:10:14 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: /Stage[main]/Placement::Wsgi::Apache/Openstacklib::Wsgi::Apache[placement_wsgi]/Apache::Vhost[placement_wsgi]/Concat[10-placement_wsgi.conf]/File[/etc/httpd/conf.d/10-placement_wsgi.conf]/ensure: defined content as '{sha256}39d8e7cb5870bdcb7bbd34d1c443847a3a16ec269ceb7ff8c9c30181d40823ba' Oct 11 09:10:14 np0005481012 puppet-user[68026]: Notice: /Stage[main]/Nova::Wsgi::Apache_api/Openstacklib::Wsgi::Apache[nova_api_wsgi]/Apache::Vhost[nova_api_wsgi]/Concat[10-nova_api_wsgi.conf]/File[/etc/httpd/conf.d/10-nova_api_wsgi.conf]/ensure: defined content as '{sha256}366528d4d602e7eb1a3b7c340f498d2f3ee869a059dc7f173ca9ed371243c5a9' Oct 11 09:10:14 np0005481012 puppet-user[68954]: Notice: Applied catalog in 0.47 seconds Oct 11 09:10:14 np0005481012 puppet-user[68954]: Application: Oct 11 09:10:14 np0005481012 puppet-user[68954]: Initial environment: production Oct 11 09:10:14 np0005481012 puppet-user[68954]: Converged environment: production Oct 11 09:10:14 np0005481012 puppet-user[68954]: Run mode: user Oct 11 09:10:14 np0005481012 puppet-user[68954]: Changes: Oct 11 09:10:14 np0005481012 puppet-user[68954]: Total: 63 Oct 11 09:10:14 np0005481012 puppet-user[68954]: Events: Oct 11 09:10:14 np0005481012 puppet-user[68954]: Success: 63 Oct 11 09:10:14 np0005481012 puppet-user[68954]: Total: 63 Oct 11 09:10:14 np0005481012 puppet-user[68954]: Resources: Oct 11 09:10:14 np0005481012 puppet-user[68954]: Skipped: 31 Oct 11 09:10:14 np0005481012 puppet-user[68954]: Changed: 63 Oct 11 09:10:14 np0005481012 puppet-user[68954]: Out of sync: 63 Oct 11 09:10:14 np0005481012 puppet-user[68954]: Total: 208 Oct 11 09:10:14 np0005481012 puppet-user[68954]: Time: Oct 11 09:10:14 np0005481012 puppet-user[68954]: Concat file: 0.00 Oct 11 09:10:14 np0005481012 puppet-user[68954]: Anchor: 0.00 Oct 11 09:10:14 np0005481012 puppet-user[68954]: Concat fragment: 0.00 Oct 11 09:10:14 np0005481012 puppet-user[68954]: Augeas: 0.02 Oct 11 09:10:14 np0005481012 puppet-user[68954]: Package: 0.02 Oct 11 09:10:14 np0005481012 puppet-user[68954]: File: 0.11 Oct 11 09:10:14 np0005481012 puppet-user[68954]: Placement config: 0.11 Oct 11 09:10:14 np0005481012 puppet-user[68954]: Transaction evaluation: 0.47 Oct 11 09:10:14 np0005481012 puppet-user[68954]: Catalog application: 0.47 Oct 11 09:10:14 np0005481012 puppet-user[68954]: Config retrieval: 1.26 Oct 11 09:10:14 np0005481012 puppet-user[68954]: Last run: 1760173814 Oct 11 09:10:14 np0005481012 puppet-user[68954]: Total: 0.47 Oct 11 09:10:14 np0005481012 puppet-user[68954]: Version: Oct 11 09:10:14 np0005481012 puppet-user[68954]: Config: 1760173812 Oct 11 09:10:14 np0005481012 puppet-user[68954]: Puppet: 7.10.0 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Notice: Applied catalog in 3.71 seconds Oct 11 09:10:14 np0005481012 puppet-user[68026]: Application: Oct 11 09:10:14 np0005481012 puppet-user[68026]: Initial environment: production Oct 11 09:10:14 np0005481012 puppet-user[68026]: Converged environment: production Oct 11 09:10:14 np0005481012 puppet-user[68026]: Run mode: user Oct 11 09:10:14 np0005481012 puppet-user[68026]: Changes: Oct 11 09:10:14 np0005481012 puppet-user[68026]: Total: 156 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Events: Oct 11 09:10:14 np0005481012 puppet-user[68026]: Success: 156 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Total: 156 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Resources: Oct 11 09:10:14 np0005481012 puppet-user[68026]: Changed: 156 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Out of sync: 156 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Skipped: 51 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Total: 517 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Time: Oct 11 09:10:14 np0005481012 puppet-user[68026]: Concat file: 0.00 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Anchor: 0.00 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Concat fragment: 0.00 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Augeas: 0.02 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Package: 0.02 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Cron: 0.03 Oct 11 09:10:14 np0005481012 puppet-user[68026]: File: 0.13 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Last run: 1760173814 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Config retrieval: 2.08 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Nova config: 3.15 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Transaction evaluation: 3.69 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Catalog application: 3.71 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Resources: 0.00 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Total: 3.71 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Version: Oct 11 09:10:14 np0005481012 puppet-user[68026]: Config: 1760173808 Oct 11 09:10:14 np0005481012 puppet-user[68026]: Puppet: 7.10.0 Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Oslo::Messaging::Default[nova_config]/Nova_config[DEFAULT/transport_url]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/driver]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/transport_url]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova/Oslo::Concurrency[nova_config]/Nova_config[oslo_concurrency/lock_path]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_type]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/region_name]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_url]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/username]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/password]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/user_domain_name]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_name]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_domain_name]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/send_service_user_token]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/www_authenticate_uri]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_type]/ensure: created Oct 11 09:10:14 np0005481012 systemd[1]: libpod-0e99fecfc410c6f7a6d05ce98538fc17821a97d603be581329d2eb1eebdd4616.scope: Deactivated successfully. Oct 11 09:10:14 np0005481012 systemd[1]: libpod-0e99fecfc410c6f7a6d05ce98538fc17821a97d603be581329d2eb1eebdd4616.scope: Consumed 3.761s CPU time. Oct 11 09:10:14 np0005481012 podman[68876]: 2025-10-11 09:10:14.549012926 +0000 UTC m=+4.125848078 container died 0e99fecfc410c6f7a6d05ce98538fc17821a97d603be581329d2eb1eebdd4616 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-type=git, version=17.1.9, name=rhosp17/openstack-placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api, io.openshift.expose-services=, vendor=Red Hat, Inc., vcs-ref=9aee5996bfe1f2bd5ce7b36f6b870ad402bd0b67, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 placement-api, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-placement-api/images/17.1.9-1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-07-21T13:58:12, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-placement-api-container, batch=17.1_20250721.1, io.openshift.tags=rhosp osp openstack osp-17.1, release=1, architecture=x86_64, io.buildah.version=1.33.12, container_name=container-puppet-placement) Oct 11 09:10:14 np0005481012 puppet-user[69324]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:14 np0005481012 puppet-user[69324]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:14 np0005481012 puppet-user[69324]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:14 np0005481012 puppet-user[69324]: (file & line not available) Oct 11 09:10:14 np0005481012 systemd[1]: var-lib-containers-storage-overlay-672752ef08405dd6dda8042eb3b8925bd0a94faafd89185258ff36d634fdc790-merged.mount: Deactivated successfully. Oct 11 09:10:14 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-0e99fecfc410c6f7a6d05ce98538fc17821a97d603be581329d2eb1eebdd4616-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:14 np0005481012 puppet-user[69324]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:14 np0005481012 puppet-user[69324]: (file & line not available) Oct 11 09:10:14 np0005481012 podman[69794]: 2025-10-11 09:10:14.625342497 +0000 UTC m=+0.068149739 container cleanup 0e99fecfc410c6f7a6d05ce98538fc17821a97d603be581329d2eb1eebdd4616 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, version=17.1.9, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=9aee5996bfe1f2bd5ce7b36f6b870ad402bd0b67, architecture=x86_64, container_name=container-puppet-placement, tcib_managed=true, managed_by=tripleo_ansible, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-placement-api/images/17.1.9-1, batch=17.1_20250721.1, io.buildah.version=1.33.12, release=1, io.openshift.expose-services=, name=rhosp17/openstack-placement-api, vcs-type=git, distribution-scope=public, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 placement-api, com.redhat.component=openstack-placement-api-container, build-date=2025-07-21T13:58:12, io.openshift.tags=rhosp osp openstack osp-17.1, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/agreements, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, description=Red Hat OpenStack Platform 17.1 placement-api, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api) Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Oct 11 09:10:14 np0005481012 systemd[1]: libpod-conmon-0e99fecfc410c6f7a6d05ce98538fc17821a97d603be581329d2eb1eebdd4616.scope: Deactivated successfully. Oct 11 09:10:14 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-placement --conmon-pidfile /run/container-puppet-placement.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,placement_config --env NAME=placement --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::placement::api --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-placement --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-placement.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcached_servers]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/region_name]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_url]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/username]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/password]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/user_domain_name]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_name]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_domain_name]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[69324]: Warning: Unknown variable: '::pacemaker::pcs_010'. (file: /etc/puppet/modules/pacemaker/manifests/resource/bundle.pp, line: 159, column: 6) Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/interface]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[69324]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 0.37 seconds Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/connection]/ensure: created Oct 11 09:10:14 np0005481012 podman[69893]: 2025-10-11 09:10:14.9606781 +0000 UTC m=+0.076611971 container create 179238bbccfb5420d48ab30bf6637a819799173de34677ba7b74c1fedbcc3960 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-swift-proxy-server/images/17.1.9-1, container_name=container-puppet-swift, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, release=1, batch=17.1_20250721.1, name=rhosp17/openstack-swift-proxy-server, tcib_managed=true, build-date=2025-07-21T14:48:37, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1, vendor=Red Hat, Inc., io.buildah.version=1.33.12, vcs-ref=2b1b2ddf50ac77b76e4bf1d1c4aad35d9d39bb77, architecture=x86_64, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.9, com.redhat.component=openstack-swift-proxy-server-container, com.redhat.license_terms=https://www.redhat.com/agreements) Oct 11 09:10:14 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/max_retries]/ensure: created Oct 11 09:10:14 np0005481012 puppet-user[69324]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Database::Redis_bundle/File[/etc/redis-tls.conf]/ensure: defined content as '{sha256}70c2507b747d7400b45c01a6f628c75a26142a98f6395fbe84c0d913dd79860c' Oct 11 09:10:14 np0005481012 systemd[1]: Started libpod-conmon-179238bbccfb5420d48ab30bf6637a819799173de34677ba7b74c1fedbcc3960.scope. Oct 11 09:10:14 np0005481012 puppet-user[69324]: Notice: /Stage[main]/Tripleo::Stunnel/Concat[/etc/stunnel/stunnel.conf]/File[/etc/stunnel/stunnel.conf]/ensure: defined content as '{sha256}f0207bb04fdeddf79a00dd589cc6516213eda49e7fa1538c5ac918984dbc294c' Oct 11 09:10:14 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:15 np0005481012 puppet-user[69324]: Notice: /Stage[main]/Redis::Config/File[/etc/redis]/mode: mode changed '0750' to '0755' Oct 11 09:10:15 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a30e8178a3ef891156d0378004a627f43940991fcf5df9ecdcb1de1d93218bc1/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:15 np0005481012 podman[69893]: 2025-10-11 09:10:15.009055956 +0000 UTC m=+0.124989827 container init 179238bbccfb5420d48ab30bf6637a819799173de34677ba7b74c1fedbcc3960 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, com.redhat.component=openstack-swift-proxy-server-container, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-swift-proxy-server/images/17.1.9-1, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, tcib_managed=true, container_name=container-puppet-swift, batch=17.1_20250721.1, name=rhosp17/openstack-swift-proxy-server, build-date=2025-07-21T14:48:37, version=17.1.9, io.buildah.version=1.33.12, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, managed_by=tripleo_ansible, vcs-ref=2b1b2ddf50ac77b76e4bf1d1c4aad35d9d39bb77, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/agreements, release=1, vcs-type=git, architecture=x86_64, config_id=tripleo_puppet_step1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server) Oct 11 09:10:15 np0005481012 puppet-user[69324]: Notice: /Stage[main]/Redis::Ulimit/File[/etc/security/limits.d/redis.conf]/ensure: defined content as '{sha256}4723daf91256d1c55ef938214e69b3359209d2df79c3dceb8b8352faf4c8886d' Oct 11 09:10:15 np0005481012 podman[69893]: 2025-10-11 09:10:15.014510054 +0000 UTC m=+0.130443925 container start 179238bbccfb5420d48ab30bf6637a819799173de34677ba7b74c1fedbcc3960 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.expose-services=, vcs-type=git, name=rhosp17/openstack-swift-proxy-server, build-date=2025-07-21T14:48:37, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.9, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-swift-proxy-server/images/17.1.9-1, container_name=container-puppet-swift, batch=17.1_20250721.1, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=2b1b2ddf50ac77b76e4bf1d1c4aad35d9d39bb77, architecture=x86_64, tcib_managed=true, distribution-scope=public, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1, io.buildah.version=1.33.12, release=1, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc.) Oct 11 09:10:15 np0005481012 podman[69893]: 2025-10-11 09:10:15.014602227 +0000 UTC m=+0.130536098 container attach 179238bbccfb5420d48ab30bf6637a819799173de34677ba7b74c1fedbcc3960 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, vcs-type=git, release=1, name=rhosp17/openstack-swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-swift-proxy-server/images/17.1.9-1, container_name=container-puppet-swift, vcs-ref=2b1b2ddf50ac77b76e4bf1d1c4aad35d9d39bb77, tcib_managed=true, com.redhat.component=openstack-swift-proxy-server-container, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1, distribution-scope=public, managed_by=tripleo_ansible, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.buildah.version=1.33.12, batch=17.1_20250721.1, build-date=2025-07-21T14:48:37, com.redhat.license_terms=https://www.redhat.com/agreements, config_id=tripleo_puppet_step1) Oct 11 09:10:15 np0005481012 puppet-user[69324]: Notice: /Stage[main]/Redis::Ulimit/File[/etc/systemd/system/redis.service.d/limit.conf]/mode: mode changed '0644' to '0444' Oct 11 09:10:15 np0005481012 podman[69893]: 2025-10-11 09:10:14.917460503 +0000 UTC m=+0.033394394 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Oct 11 09:10:15 np0005481012 systemd[1]: libpod-4091fcdfcd7f5454183afece0c0f15543f69ee5b931e98c4963da499334ceefc.scope: Deactivated successfully. Oct 11 09:10:15 np0005481012 systemd[1]: libpod-4091fcdfcd7f5454183afece0c0f15543f69ee5b931e98c4963da499334ceefc.scope: Consumed 8.266s CPU time. Oct 11 09:10:15 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/db_max_retries]/ensure: created Oct 11 09:10:15 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Db/Oslo::Db[api_database]/Nova_config[api_database/connection]/ensure: created Oct 11 09:10:15 np0005481012 puppet-user[69324]: Notice: /Stage[main]/Redis::Config/Redis::Instance[default]/File[/etc/redis.conf.puppet]/ensure: defined content as '{sha256}693732b81a23f1d8171aed02e8a1bd796973ed7006c60ab47f05916586387c1d' Oct 11 09:10:15 np0005481012 puppet-user[69551]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:15 np0005481012 puppet-user[69551]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:15 np0005481012 puppet-user[69324]: Notice: /Stage[main]/Redis::Config/Redis::Instance[default]/Exec[cp -p /etc/redis.conf.puppet /etc/redis.conf]: Triggered 'refresh' from 1 event Oct 11 09:10:15 np0005481012 puppet-user[69551]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:15 np0005481012 puppet-user[69551]: (file & line not available) Oct 11 09:10:15 np0005481012 puppet-user[69324]: Notice: Applied catalog in 0.17 seconds Oct 11 09:10:15 np0005481012 puppet-user[69324]: Application: Oct 11 09:10:15 np0005481012 puppet-user[69324]: Initial environment: production Oct 11 09:10:15 np0005481012 puppet-user[69324]: Converged environment: production Oct 11 09:10:15 np0005481012 puppet-user[69324]: Run mode: user Oct 11 09:10:15 np0005481012 puppet-user[69324]: Changes: Oct 11 09:10:15 np0005481012 puppet-user[69324]: Total: 7 Oct 11 09:10:15 np0005481012 puppet-user[69324]: Events: Oct 11 09:10:15 np0005481012 puppet-user[69324]: Success: 7 Oct 11 09:10:15 np0005481012 puppet-user[69324]: Total: 7 Oct 11 09:10:15 np0005481012 puppet-user[69324]: Resources: Oct 11 09:10:15 np0005481012 puppet-user[69324]: Restarted: 1 Oct 11 09:10:15 np0005481012 puppet-user[69324]: Skipped: 14 Oct 11 09:10:15 np0005481012 puppet-user[69324]: Changed: 7 Oct 11 09:10:15 np0005481012 puppet-user[69324]: Out of sync: 7 Oct 11 09:10:15 np0005481012 puppet-user[69324]: Total: 30 Oct 11 09:10:15 np0005481012 puppet-user[69324]: Time: Oct 11 09:10:15 np0005481012 puppet-user[69324]: Concat file: 0.00 Oct 11 09:10:15 np0005481012 puppet-user[69324]: Concat fragment: 0.00 Oct 11 09:10:15 np0005481012 puppet-user[69324]: Exec: 0.00 Oct 11 09:10:15 np0005481012 puppet-user[69324]: Augeas: 0.02 Oct 11 09:10:15 np0005481012 puppet-user[69324]: File: 0.09 Oct 11 09:10:15 np0005481012 puppet-user[69324]: Transaction evaluation: 0.16 Oct 11 09:10:15 np0005481012 puppet-user[69324]: Catalog application: 0.17 Oct 11 09:10:15 np0005481012 puppet-user[69324]: Config retrieval: 0.43 Oct 11 09:10:15 np0005481012 puppet-user[69324]: Last run: 1760173815 Oct 11 09:10:15 np0005481012 puppet-user[69324]: Total: 0.17 Oct 11 09:10:15 np0005481012 puppet-user[69324]: Version: Oct 11 09:10:15 np0005481012 puppet-user[69324]: Config: 1760173814 Oct 11 09:10:15 np0005481012 puppet-user[69324]: Puppet: 7.10.0 Oct 11 09:10:15 np0005481012 puppet-user[69551]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:15 np0005481012 puppet-user[69551]: (file & line not available) Oct 11 09:10:15 np0005481012 podman[69986]: 2025-10-11 09:10:15.154310809 +0000 UTC m=+0.049710448 container died 4091fcdfcd7f5454183afece0c0f15543f69ee5b931e98c4963da499334ceefc (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/agreements, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., build-date=2025-07-21T16:05:11, vcs-ref=1bf0113009f3d1746f0030e40da5d2674940fc4f, vcs-type=git, io.buildah.version=1.33.12, managed_by=tripleo_ansible, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1, architecture=x86_64, config_id=tripleo_puppet_step1, com.redhat.component=openstack-nova-api-container, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-nova-api/images/17.1.9-1, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, release=1, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.9, io.openshift.expose-services=, batch=17.1_20250721.1, name=rhosp17/openstack-nova-api, container_name=container-puppet-nova) Oct 11 09:10:15 np0005481012 podman[69986]: 2025-10-11 09:10:15.184454891 +0000 UTC m=+0.079854500 container cleanup 4091fcdfcd7f5454183afece0c0f15543f69ee5b931e98c4963da499334ceefc (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/agreements, container_name=container-puppet-nova, version=17.1.9, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1, architecture=x86_64, name=rhosp17/openstack-nova-api, vcs-ref=1bf0113009f3d1746f0030e40da5d2674940fc4f, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-nova-api/images/17.1.9-1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, release=1, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, batch=17.1_20250721.1, build-date=2025-07-21T16:05:11, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.33.12, io.openshift.expose-services=, tcib_managed=true, com.redhat.component=openstack-nova-api-container, description=Red Hat OpenStack Platform 17.1 nova-api) Oct 11 09:10:15 np0005481012 systemd[1]: libpod-conmon-4091fcdfcd7f5454183afece0c0f15543f69ee5b931e98c4963da499334ceefc.scope: Deactivated successfully. Oct 11 09:10:15 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-nova --conmon-pidfile /run/container-puppet-nova.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config --env NAME=nova --env STEP_CONFIG=include ::tripleo::packages#012['Nova_cell_v2'].each |String $val| { noop_resource($val) }#012include tripleo::profile::base::nova::api#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::nova::conductor#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::nova::scheduler#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::nova::vncproxy#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-nova --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-nova.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Wsgi::Apache_metadata/Openstacklib::Wsgi::Apache[nova_metadata_wsgi]/File[/var/www/cgi-bin/nova]/ensure: created Oct 11 09:10:15 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Wsgi::Apache_metadata/Openstacklib::Wsgi::Apache[nova_metadata_wsgi]/File[nova_metadata_wsgi]/ensure: defined content as '{sha256}7311c9047eec89f1e952197038ebb53e3ab5810905e7292a2f802c7e4fc0351c' Oct 11 09:10:15 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Oct 11 09:10:15 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Oct 11 09:10:15 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Oct 11 09:10:15 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Oct 11 09:10:15 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Oct 11 09:10:15 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Oct 11 09:10:15 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Oct 11 09:10:15 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Oct 11 09:10:15 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Oct 11 09:10:15 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Oct 11 09:10:15 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Oct 11 09:10:15 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Oct 11 09:10:15 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Oct 11 09:10:15 np0005481012 puppet-user[68509]: Notice: /Stage[main]/Nova::Wsgi::Apache_metadata/Openstacklib::Wsgi::Apache[nova_metadata_wsgi]/Apache::Vhost[nova_metadata_wsgi]/Concat[10-nova_metadata_wsgi.conf]/File[/etc/httpd/conf.d/10-nova_metadata_wsgi.conf]/ensure: defined content as '{sha256}b521d2712148f0aa3e7a86b357848420ef361818007e686f16d2d796c71c5f1e' Oct 11 09:10:15 np0005481012 puppet-user[68509]: Notice: Applied catalog in 3.10 seconds Oct 11 09:10:15 np0005481012 puppet-user[68509]: Application: Oct 11 09:10:15 np0005481012 puppet-user[68509]: Initial environment: production Oct 11 09:10:15 np0005481012 puppet-user[68509]: Converged environment: production Oct 11 09:10:15 np0005481012 puppet-user[68509]: Run mode: user Oct 11 09:10:15 np0005481012 puppet-user[68509]: Changes: Oct 11 09:10:15 np0005481012 puppet-user[68509]: Total: 126 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Events: Oct 11 09:10:15 np0005481012 puppet-user[68509]: Success: 126 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Total: 126 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Resources: Oct 11 09:10:15 np0005481012 puppet-user[68509]: Changed: 126 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Out of sync: 126 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Skipped: 37 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Total: 421 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Time: Oct 11 09:10:15 np0005481012 puppet-user[68509]: Concat file: 0.00 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Anchor: 0.00 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Concat fragment: 0.00 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Augeas: 0.02 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Package: 0.02 Oct 11 09:10:15 np0005481012 puppet-user[68509]: File: 0.14 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Config retrieval: 1.86 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Last run: 1760173815 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Nova config: 2.64 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Transaction evaluation: 3.09 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Catalog application: 3.10 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Resources: 0.00 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Total: 3.10 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Version: Oct 11 09:10:15 np0005481012 puppet-user[68509]: Config: 1760173810 Oct 11 09:10:15 np0005481012 puppet-user[68509]: Puppet: 7.10.0 Oct 11 09:10:15 np0005481012 puppet-user[69178]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:15 np0005481012 puppet-user[69178]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:15 np0005481012 puppet-user[69178]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:15 np0005481012 puppet-user[69178]: (file & line not available) Oct 11 09:10:15 np0005481012 puppet-user[69178]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:15 np0005481012 puppet-user[69178]: (file & line not available) Oct 11 09:10:15 np0005481012 systemd[1]: libpod-cd0e1b6c5bfd8644a34dbbbd5d13f4825243f1fd66d1688b2f34acff4a2f4a34.scope: Deactivated successfully. Oct 11 09:10:15 np0005481012 systemd[1]: libpod-cd0e1b6c5bfd8644a34dbbbd5d13f4825243f1fd66d1688b2f34acff4a2f4a34.scope: Consumed 2.926s CPU time. Oct 11 09:10:15 np0005481012 podman[69275]: 2025-10-11 09:10:15.446682264 +0000 UTC m=+3.258500262 container died cd0e1b6c5bfd8644a34dbbbd5d13f4825243f1fd66d1688b2f34acff4a2f4a34 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, io.openshift.expose-services=, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-redis-container, io.openshift.tags=rhosp osp openstack osp-17.1, container_name=container-puppet-redis, version=17.1.9, distribution-scope=public, batch=17.1_20250721.1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-redis/images/17.1.9-1, io.buildah.version=1.33.12, tcib_managed=true, release=1, com.redhat.license_terms=https://www.redhat.com/agreements, build-date=2025-07-21T13:10:13, vcs-ref=ff6161246d28f7887060a5133e281d72aa432576, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, description=Red Hat OpenStack Platform 17.1 redis, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 redis, architecture=x86_64, name=rhosp17/openstack-redis) Oct 11 09:10:15 np0005481012 podman[70141]: 2025-10-11 09:10:15.548194103 +0000 UTC m=+0.091265334 container cleanup cd0e1b6c5bfd8644a34dbbbd5d13f4825243f1fd66d1688b2f34acff4a2f4a34 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, com.redhat.component=openstack-redis-container, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, io.openshift.tags=rhosp osp openstack osp-17.1, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 redis, config_id=tripleo_puppet_step1, distribution-scope=public, version=17.1.9, description=Red Hat OpenStack Platform 17.1 redis, tcib_managed=true, architecture=x86_64, name=rhosp17/openstack-redis, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-redis/images/17.1.9-1, container_name=container-puppet-redis, io.buildah.version=1.33.12, batch=17.1_20250721.1, release=1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, managed_by=tripleo_ansible, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.expose-services=, vcs-ref=ff6161246d28f7887060a5133e281d72aa432576, build-date=2025-07-21T13:10:13) Oct 11 09:10:15 np0005481012 systemd[1]: libpod-conmon-cd0e1b6c5bfd8644a34dbbbd5d13f4825243f1fd66d1688b2f34acff4a2f4a34.scope: Deactivated successfully. Oct 11 09:10:15 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-redis --conmon-pidfile /run/container-puppet-redis.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,exec --env NAME=redis --env STEP_CONFIG=include ::tripleo::packages#012Exec <| title == 'systemd-reload-redis' |> { unless => 'true' }#012include tripleo::profile::pacemaker::database::redis_bundle#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-redis --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-redis.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Oct 11 09:10:15 np0005481012 puppet-user[69551]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 0.50 seconds Oct 11 09:10:15 np0005481012 systemd[1]: var-lib-containers-storage-overlay-da40f2901d4d2c97d4fc3d49c3fe5693905483134a3033990c9b4ba33101a90f-merged.mount: Deactivated successfully. Oct 11 09:10:15 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-cd0e1b6c5bfd8644a34dbbbd5d13f4825243f1fd66d1688b2f34acff4a2f4a34-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:15 np0005481012 systemd[1]: var-lib-containers-storage-overlay-a1ac5e95af3decc83db6119975ffab84173b4cc4010013b04254d99ab9eb5d64-merged.mount: Deactivated successfully. Oct 11 09:10:15 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-4091fcdfcd7f5454183afece0c0f15543f69ee5b931e98c4963da499334ceefc-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:15 np0005481012 podman[70151]: 2025-10-11 09:10:15.614488444 +0000 UTC m=+0.136706660 container create 9d4de267af0853df51c5c28f56c9461e7d06c553b0772362a8d4dcb6050f50e5 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1, batch=17.1_20250721.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/agreements, io.buildah.version=1.33.12, release=1, com.redhat.component=openstack-swift-proxy-server-container, name=rhosp17/openstack-swift-proxy-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.9, io.openshift.expose-services=, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, container_name=container-puppet-swift_ringbuilder, build-date=2025-07-21T14:48:37, config_id=tripleo_puppet_step1, architecture=x86_64, tcib_managed=true, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=2b1b2ddf50ac77b76e4bf1d1c4aad35d9d39bb77, vendor=Red Hat, Inc., url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-swift-proxy-server/images/17.1.9-1) Oct 11 09:10:15 np0005481012 puppet-user[69178]: Warning: Unknown variable: '::pacemaker::pcs_010'. (file: /etc/puppet/modules/pacemaker/manifests/resource/bundle.pp, line: 159, column: 6) Oct 11 09:10:15 np0005481012 podman[70151]: 2025-10-11 09:10:15.564053594 +0000 UTC m=+0.086271790 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Oct 11 09:10:15 np0005481012 systemd[1]: Started libpod-conmon-9d4de267af0853df51c5c28f56c9461e7d06c553b0772362a8d4dcb6050f50e5.scope. Oct 11 09:10:15 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:15 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/973b4eb7209c096d6b85a219137a56dfb018bd659c6daeb4fb4c3303c2628058/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:15 np0005481012 podman[70151]: 2025-10-11 09:10:15.689923296 +0000 UTC m=+0.212141482 container init 9d4de267af0853df51c5c28f56c9461e7d06c553b0772362a8d4dcb6050f50e5 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.tags=rhosp osp openstack osp-17.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-type=git, build-date=2025-07-21T14:48:37, io.buildah.version=1.33.12, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, container_name=container-puppet-swift_ringbuilder, tcib_managed=true, vcs-ref=2b1b2ddf50ac77b76e4bf1d1c4aad35d9d39bb77, vendor=Red Hat, Inc., release=1, distribution-scope=public, architecture=x86_64, io.openshift.expose-services=, name=rhosp17/openstack-swift-proxy-server, managed_by=tripleo_ansible, batch=17.1_20250721.1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.9, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-swift-proxy-server/images/17.1.9-1, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_id=tripleo_puppet_step1, com.redhat.component=openstack-swift-proxy-server-container, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Oct 11 09:10:15 np0005481012 puppet-user[69178]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 0.38 seconds Oct 11 09:10:15 np0005481012 podman[70151]: 2025-10-11 09:10:15.706133208 +0000 UTC m=+0.228351394 container start 9d4de267af0853df51c5c28f56c9461e7d06c553b0772362a8d4dcb6050f50e5 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, io.buildah.version=1.33.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, tcib_managed=true, build-date=2025-07-21T14:48:37, com.redhat.component=openstack-swift-proxy-server-container, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-swift-proxy-server/images/17.1.9-1, architecture=x86_64, name=rhosp17/openstack-swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/agreements, version=17.1.9, vcs-ref=2b1b2ddf50ac77b76e4bf1d1c4aad35d9d39bb77, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1, container_name=container-puppet-swift_ringbuilder, config_id=tripleo_puppet_step1, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, vendor=Red Hat, Inc., release=1, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.expose-services=, batch=17.1_20250721.1) Oct 11 09:10:15 np0005481012 podman[70151]: 2025-10-11 09:10:15.706356555 +0000 UTC m=+0.228574751 container attach 9d4de267af0853df51c5c28f56c9461e7d06c553b0772362a8d4dcb6050f50e5 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, vcs-ref=2b1b2ddf50ac77b76e4bf1d1c4aad35d9d39bb77, io.openshift.tags=rhosp osp openstack osp-17.1, com.redhat.license_terms=https://www.redhat.com/agreements, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, container_name=container-puppet-swift_ringbuilder, name=rhosp17/openstack-swift-proxy-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, io.buildah.version=1.33.12, architecture=x86_64, tcib_managed=true, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-swift-proxy-server/images/17.1.9-1, config_id=tripleo_puppet_step1, version=17.1.9, release=1, build-date=2025-07-21T14:48:37, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, batch=17.1_20250721.1, vcs-type=git) Oct 11 09:10:15 np0005481012 puppet-user[69178]: Notice: /Stage[main]/Rabbitmq::Config/File[/etc/rabbitmq]/mode: mode changed '0755' to '2755' Oct 11 09:10:15 np0005481012 puppet-user[69178]: Notice: /Stage[main]/Tripleo::Profile::Base::Rabbitmq/File[/etc/rabbitmq/ssl-dist.conf]/ensure: defined content as '{sha256}4fcb8b2c0ce7c31ae2a64808de62371e284138a67310e23f1c73dbf139a874c7' Oct 11 09:10:15 np0005481012 puppet-user[69178]: Notice: /Stage[main]/Rabbitmq::Config/File[/etc/rabbitmq/ssl]/ensure: created Oct 11 09:10:15 np0005481012 puppet-user[69178]: Notice: /Stage[main]/Rabbitmq::Config/File[rabbitmq-env.config]/ensure: defined content as '{sha256}e3ab8f1764c51353c28a90da04ab16e5d9d1b32a808a5e65a8eb486766e35a2e' Oct 11 09:10:15 np0005481012 puppet-user[69551]: Notice: /Stage[main]/Rsyslog::Base/File[/etc/rsyslog.conf]/content: content changed '{sha256}d6f679f6a4eb6f33f9fc20c846cb30bef93811e1c86bc4da1946dc3100b826c3' to '{sha256}7963bd801fadd49a17561f4d3f80738c3f504b413b11c443432d8303138041f2' Oct 11 09:10:15 np0005481012 puppet-user[69178]: Notice: /Stage[main]/Rabbitmq::Config/File[rabbitmq-inetrc]/ensure: defined content as '{sha256}b83b8080dbcdf2a49fff2f747972e7343801f7518a0f1dcb3e2a301e50aef551' Oct 11 09:10:15 np0005481012 puppet-user[69178]: Notice: /Stage[main]/Rabbitmq::Config/File[enabled_plugins]/ensure: defined content as '{sha256}3b5c9fba2f1456d923499fc142bc9ef7a7f6d53d6bc4c0ae88310332eb10a31c' Oct 11 09:10:15 np0005481012 puppet-user[69178]: Notice: /Stage[main]/Rabbitmq::Config/File[/etc/security/limits.d/rabbitmq-server.conf]/ensure: defined content as '{sha256}b984a5f0a62696715f206ca0a602fd9d2d497894c6c24502896fb3010ee0c557' Oct 11 09:10:15 np0005481012 puppet-user[69178]: Notice: /Stage[main]/Rabbitmq::Config/File[rabbitmq.config]/ensure: defined content as '{sha256}f9075bd7022e577fc11fd121cf2ee7af91541c22a85aa702540e019fd4d45382' Oct 11 09:10:15 np0005481012 puppet-user[69551]: Notice: /Stage[main]/Rsyslog::Config::Global/Rsyslog::Component::Global_config[MaxMessageSize]/Rsyslog::Generate_concat[rsyslog::concat::global_config::MaxMessageSize]/Concat[/etc/rsyslog.d/00_rsyslog.conf]/File[/etc/rsyslog.d/00_rsyslog.conf]/ensure: defined content as '{sha256}a291d5cc6d5884a978161f4c7b5831d43edd07797cc590bae366e7f150b8643b' Oct 11 09:10:15 np0005481012 puppet-user[69178]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Rabbitmq_bundle/File[/var/lib/rabbitmq/.erlang.cookie]/content: content changed '{sha256}768077e4d32ee5d6320c75114f7149bef59d47c725205cc0bf069685087b40d7' to '{sha256}69c5c890f373f745adb3d03becfa0e5d3fd60e44d5f38b520ee695167f1c02df' Oct 11 09:10:15 np0005481012 puppet-user[69178]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Rabbitmq_bundle/File_line[rabbitmq-pamd-systemd]/ensure: removed Oct 11 09:10:15 np0005481012 puppet-user[69178]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Rabbitmq_bundle/File_line[rabbitmq-pamd-succeed]/ensure: created Oct 11 09:10:15 np0005481012 puppet-user[69178]: Notice: Applied catalog in 0.08 seconds Oct 11 09:10:15 np0005481012 puppet-user[69178]: Application: Oct 11 09:10:15 np0005481012 puppet-user[69178]: Initial environment: production Oct 11 09:10:15 np0005481012 puppet-user[69178]: Converged environment: production Oct 11 09:10:15 np0005481012 puppet-user[69178]: Run mode: user Oct 11 09:10:15 np0005481012 puppet-user[69178]: Changes: Oct 11 09:10:15 np0005481012 puppet-user[69178]: Total: 11 Oct 11 09:10:15 np0005481012 puppet-user[69178]: Events: Oct 11 09:10:15 np0005481012 puppet-user[69178]: Success: 11 Oct 11 09:10:15 np0005481012 puppet-user[69178]: Total: 11 Oct 11 09:10:15 np0005481012 puppet-user[69178]: Resources: Oct 11 09:10:15 np0005481012 puppet-user[69178]: Changed: 11 Oct 11 09:10:15 np0005481012 puppet-user[69178]: Out of sync: 11 Oct 11 09:10:15 np0005481012 puppet-user[69178]: Skipped: 17 Oct 11 09:10:15 np0005481012 puppet-user[69178]: Total: 28 Oct 11 09:10:15 np0005481012 puppet-user[69178]: Time: Oct 11 09:10:15 np0005481012 puppet-user[69178]: File line: 0.00 Oct 11 09:10:15 np0005481012 puppet-user[69178]: File: 0.05 Oct 11 09:10:15 np0005481012 puppet-user[69178]: Transaction evaluation: 0.07 Oct 11 09:10:15 np0005481012 puppet-user[69178]: Catalog application: 0.08 Oct 11 09:10:15 np0005481012 puppet-user[69178]: Config retrieval: 0.43 Oct 11 09:10:15 np0005481012 puppet-user[69178]: Last run: 1760173815 Oct 11 09:10:15 np0005481012 puppet-user[69178]: Total: 0.08 Oct 11 09:10:15 np0005481012 puppet-user[69178]: Version: Oct 11 09:10:15 np0005481012 puppet-user[69178]: Config: 1760173815 Oct 11 09:10:15 np0005481012 puppet-user[69178]: Puppet: 7.10.0 Oct 11 09:10:15 np0005481012 puppet-user[69551]: Notice: /Stage[main]/Rsyslog::Config::Templates/Rsyslog::Component::Template[rsyslog-node-index]/Rsyslog::Generate_concat[rsyslog::concat::template::rsyslog-node-index]/Concat[/etc/rsyslog.d/50_openstack_logs.conf]/File[/etc/rsyslog.d/50_openstack_logs.conf]/ensure: defined content as '{sha256}ecab269daaa6487b79d098519431354da426385d869a75940f5d25f8adf81120' Oct 11 09:10:15 np0005481012 puppet-user[69551]: Notice: Applied catalog in 0.19 seconds Oct 11 09:10:15 np0005481012 puppet-user[69551]: Application: Oct 11 09:10:15 np0005481012 puppet-user[69551]: Initial environment: production Oct 11 09:10:15 np0005481012 puppet-user[69551]: Converged environment: production Oct 11 09:10:15 np0005481012 puppet-user[69551]: Run mode: user Oct 11 09:10:15 np0005481012 puppet-user[69551]: Changes: Oct 11 09:10:15 np0005481012 puppet-user[69551]: Total: 3 Oct 11 09:10:15 np0005481012 puppet-user[69551]: Events: Oct 11 09:10:15 np0005481012 puppet-user[69551]: Success: 3 Oct 11 09:10:15 np0005481012 puppet-user[69551]: Total: 3 Oct 11 09:10:15 np0005481012 puppet-user[69551]: Resources: Oct 11 09:10:15 np0005481012 puppet-user[69551]: Skipped: 11 Oct 11 09:10:15 np0005481012 puppet-user[69551]: Changed: 3 Oct 11 09:10:15 np0005481012 puppet-user[69551]: Out of sync: 3 Oct 11 09:10:15 np0005481012 puppet-user[69551]: Total: 45 Oct 11 09:10:15 np0005481012 puppet-user[69551]: Time: Oct 11 09:10:15 np0005481012 puppet-user[69551]: Concat file: 0.00 Oct 11 09:10:15 np0005481012 puppet-user[69551]: Concat fragment: 0.00 Oct 11 09:10:15 np0005481012 puppet-user[69551]: File: 0.02 Oct 11 09:10:15 np0005481012 puppet-user[69551]: Transaction evaluation: 0.18 Oct 11 09:10:15 np0005481012 puppet-user[69551]: Catalog application: 0.19 Oct 11 09:10:15 np0005481012 puppet-user[69551]: Config retrieval: 0.56 Oct 11 09:10:15 np0005481012 puppet-user[69551]: Last run: 1760173815 Oct 11 09:10:15 np0005481012 puppet-user[69551]: Total: 0.19 Oct 11 09:10:15 np0005481012 puppet-user[69551]: Version: Oct 11 09:10:15 np0005481012 puppet-user[69551]: Config: 1760173815 Oct 11 09:10:15 np0005481012 puppet-user[69551]: Puppet: 7.10.0 Oct 11 09:10:16 np0005481012 systemd[1]: libpod-7085b252102396761cde22353327712192d50c675e6d2304d37ca9d5770dcd42.scope: Deactivated successfully. Oct 11 09:10:16 np0005481012 systemd[1]: libpod-7085b252102396761cde22353327712192d50c675e6d2304d37ca9d5770dcd42.scope: Consumed 2.624s CPU time. Oct 11 09:10:16 np0005481012 systemd[1]: libpod-17af7935f873dc0b83c763123b5c8167d762c9263c6320ebb488f7479f3a00d3.scope: Deactivated successfully. Oct 11 09:10:16 np0005481012 systemd[1]: libpod-17af7935f873dc0b83c763123b5c8167d762c9263c6320ebb488f7479f3a00d3.scope: Consumed 4.910s CPU time. Oct 11 09:10:16 np0005481012 podman[69487]: 2025-10-11 09:10:16.163309439 +0000 UTC m=+2.948089059 container died 7085b252102396761cde22353327712192d50c675e6d2304d37ca9d5770dcd42 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-rsyslog/images/17.1.9-1, batch=17.1_20250721.1, architecture=x86_64, container_name=container-puppet-rsyslog, build-date=2025-07-21T12:58:40, vcs-ref=38a223d7b691af709e0a5f628409462e34eea167, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, io.buildah.version=1.33.12, com.redhat.license_terms=https://www.redhat.com/agreements, name=rhosp17/openstack-rsyslog, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 rsyslog, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.9, release=1, vcs-type=git, description=Red Hat OpenStack Platform 17.1 rsyslog, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, io.openshift.tags=rhosp osp openstack osp-17.1, tcib_managed=true, io.openshift.expose-services=, com.redhat.component=openstack-rsyslog-container, distribution-scope=public, config_id=tripleo_puppet_step1) Oct 11 09:10:16 np0005481012 systemd[1]: libpod-f052f9a721ab8cc1c16f8c854e9ae6bf7670c5a9887e326151b77fc786d23902.scope: Deactivated successfully. Oct 11 09:10:16 np0005481012 systemd[1]: libpod-f052f9a721ab8cc1c16f8c854e9ae6bf7670c5a9887e326151b77fc786d23902.scope: Consumed 7.441s CPU time. Oct 11 09:10:16 np0005481012 podman[68372]: 2025-10-11 09:10:16.191617135 +0000 UTC m=+8.101489499 container died f052f9a721ab8cc1c16f8c854e9ae6bf7670c5a9887e326151b77fc786d23902 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, batch=17.1_20250721.1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-nova-api/images/17.1.9-1, description=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=1bf0113009f3d1746f0030e40da5d2674940fc4f, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.9, container_name=container-puppet-nova_metadata, build-date=2025-07-21T16:05:11, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1, release=1, config_id=tripleo_puppet_step1, name=rhosp17/openstack-nova-api, distribution-scope=public, io.buildah.version=1.33.12, io.openshift.expose-services=, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/agreements, maintainer=OpenStack TripleO Team, architecture=x86_64, com.redhat.component=openstack-nova-api-container) Oct 11 09:10:16 np0005481012 podman[69068]: 2025-10-11 09:10:16.213636295 +0000 UTC m=+4.802982872 container died 17af7935f873dc0b83c763123b5c8167d762c9263c6320ebb488f7479f3a00d3 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, vcs-type=git, description=Red Hat OpenStack Platform 17.1 rabbitmq, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-rabbitmq/images/17.1.9-1, vcs-ref=b30dae4cd2f9a99467af45e3d985bc71318ed98b, container_name=container-puppet-rabbitmq, tcib_managed=true, com.redhat.component=openstack-rabbitmq-container, distribution-scope=public, release=1, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/agreements, build-date=2025-07-21T13:08:05, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.33.12, vendor=Red Hat, Inc., io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, config_id=tripleo_puppet_step1, name=rhosp17/openstack-rabbitmq, maintainer=OpenStack TripleO Team, batch=17.1_20250721.1, io.openshift.tags=rhosp osp openstack osp-17.1, version=17.1.9) Oct 11 09:10:16 np0005481012 podman[70306]: 2025-10-11 09:10:16.325521406 +0000 UTC m=+0.151268730 container cleanup 7085b252102396761cde22353327712192d50c675e6d2304d37ca9d5770dcd42 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, io.openshift.tags=rhosp osp openstack osp-17.1, name=rhosp17/openstack-rsyslog, release=1, container_name=container-puppet-rsyslog, vcs-type=git, architecture=x86_64, batch=17.1_20250721.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-rsyslog/images/17.1.9-1, config_id=tripleo_puppet_step1, distribution-scope=public, io.buildah.version=1.33.12, description=Red Hat OpenStack Platform 17.1 rsyslog, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/agreements, managed_by=tripleo_ansible, com.redhat.component=openstack-rsyslog-container, io.openshift.expose-services=, version=17.1.9, build-date=2025-07-21T12:58:40, summary=Red Hat OpenStack Platform 17.1 rsyslog, maintainer=OpenStack TripleO Team, vcs-ref=38a223d7b691af709e0a5f628409462e34eea167) Oct 11 09:10:16 np0005481012 systemd[1]: libpod-conmon-7085b252102396761cde22353327712192d50c675e6d2304d37ca9d5770dcd42.scope: Deactivated successfully. Oct 11 09:10:16 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-rsyslog --conmon-pidfile /run/container-puppet-rsyslog.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment --env NAME=rsyslog --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::logging::rsyslog --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-rsyslog --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-rsyslog.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Oct 11 09:10:16 np0005481012 podman[70307]: 2025-10-11 09:10:16.357778585 +0000 UTC m=+0.180545677 container cleanup 17af7935f873dc0b83c763123b5c8167d762c9263c6320ebb488f7479f3a00d3 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, batch=17.1_20250721.1, build-date=2025-07-21T13:08:05, vendor=Red Hat, Inc., url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-rabbitmq/images/17.1.9-1, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.expose-services=, container_name=container-puppet-rabbitmq, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.tags=rhosp osp openstack osp-17.1, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, tcib_managed=true, vcs-ref=b30dae4cd2f9a99467af45e3d985bc71318ed98b, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.component=openstack-rabbitmq-container, vcs-type=git, release=1, summary=Red Hat OpenStack Platform 17.1 rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, distribution-scope=public, name=rhosp17/openstack-rabbitmq, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.33.12, version=17.1.9) Oct 11 09:10:16 np0005481012 systemd[1]: libpod-conmon-17af7935f873dc0b83c763123b5c8167d762c9263c6320ebb488f7479f3a00d3.scope: Deactivated successfully. Oct 11 09:10:16 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-rabbitmq --conmon-pidfile /run/container-puppet-rabbitmq.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file,file_line --env NAME=rabbitmq --env STEP_CONFIG=include ::tripleo::packages#012['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }#012include tripleo::profile::pacemaker::rabbitmq_bundle --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-rabbitmq --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-rabbitmq.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Oct 11 09:10:16 np0005481012 podman[70328]: 2025-10-11 09:10:16.386674318 +0000 UTC m=+0.184140917 container cleanup f052f9a721ab8cc1c16f8c854e9ae6bf7670c5a9887e326151b77fc786d23902 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, release=1, build-date=2025-07-21T16:05:11, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-nova-api/images/17.1.9-1, com.redhat.component=openstack-nova-api-container, io.openshift.tags=rhosp osp openstack osp-17.1, vcs-ref=1bf0113009f3d1746f0030e40da5d2674940fc4f, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, container_name=container-puppet-nova_metadata, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/agreements, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., io.buildah.version=1.33.12, managed_by=tripleo_ansible, name=rhosp17/openstack-nova-api, version=17.1.9, io.openshift.expose-services=, vcs-type=git, batch=17.1_20250721.1) Oct 11 09:10:16 np0005481012 systemd[1]: libpod-conmon-f052f9a721ab8cc1c16f8c854e9ae6bf7670c5a9887e326151b77fc786d23902.scope: Deactivated successfully. Oct 11 09:10:16 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-nova_metadata --conmon-pidfile /run/container-puppet-nova_metadata.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini --env NAME=nova_metadata --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::nova::metadata#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-nova_metadata --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-nova_metadata.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Oct 11 09:10:16 np0005481012 systemd[1]: tmp-crun.64Fcft.mount: Deactivated successfully. Oct 11 09:10:16 np0005481012 systemd[1]: var-lib-containers-storage-overlay-3d6a159c785ad62010c6e05527242734146fa0f5fe7521143f6b8a4ed6961896-merged.mount: Deactivated successfully. Oct 11 09:10:16 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-7085b252102396761cde22353327712192d50c675e6d2304d37ca9d5770dcd42-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:16 np0005481012 systemd[1]: var-lib-containers-storage-overlay-55f94aaa97e04e96fe5c2adacffb81e37f2f86103a2bbe2fb85cc558e316b2b7-merged.mount: Deactivated successfully. Oct 11 09:10:16 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-17af7935f873dc0b83c763123b5c8167d762c9263c6320ebb488f7479f3a00d3-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:16 np0005481012 systemd[1]: var-lib-containers-storage-overlay-9e5280cb62e6bbd37af133e18c730e6bbcebfefa6dca8653357a8b27161ebb80-merged.mount: Deactivated successfully. Oct 11 09:10:16 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-f052f9a721ab8cc1c16f8c854e9ae6bf7670c5a9887e326151b77fc786d23902-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:16 np0005481012 puppet-user[69988]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:16 np0005481012 puppet-user[69988]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:16 np0005481012 puppet-user[69988]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:16 np0005481012 puppet-user[69988]: (file & line not available) Oct 11 09:10:17 np0005481012 puppet-user[69988]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:17 np0005481012 puppet-user[69988]: (file & line not available) Oct 11 09:10:17 np0005481012 puppet-user[70213]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Oct 11 09:10:17 np0005481012 puppet-user[70213]: (file: /etc/puppet/hiera.yaml) Oct 11 09:10:17 np0005481012 puppet-user[70213]: Warning: Undefined variable '::deploy_config_name'; Oct 11 09:10:17 np0005481012 puppet-user[70213]: (file & line not available) Oct 11 09:10:17 np0005481012 puppet-user[69988]: Warning: Scope(Class[Swift::Proxy::S3token]): Usage of the default password is deprecated and will be removed in a future release. \ Oct 11 09:10:17 np0005481012 puppet-user[69988]: Please set password parameter Oct 11 09:10:17 np0005481012 puppet-user[70213]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Oct 11 09:10:17 np0005481012 puppet-user[70213]: (file & line not available) Oct 11 09:10:17 np0005481012 puppet-user[69988]: Warning: Scope(Class[Swift::Keymaster]): password parameter is missing Oct 11 09:10:17 np0005481012 puppet-user[69988]: Warning: Scope(Class[Swift::Storage::All]): The default port for the object storage server has changed \ Oct 11 09:10:17 np0005481012 puppet-user[69988]: from 6000 to 6200 and will be changed in a later release Oct 11 09:10:17 np0005481012 puppet-user[69988]: Warning: Scope(Class[Swift::Storage::All]): The default port for the container storage server has changed \ Oct 11 09:10:17 np0005481012 puppet-user[69988]: from 6001 to 6201 and will be changed in a later release Oct 11 09:10:17 np0005481012 puppet-user[69988]: Warning: Scope(Class[Swift::Storage::All]): The default port for the account storage server has changed \ Oct 11 09:10:17 np0005481012 puppet-user[69988]: from 6002 to 6202 and will be changed in a later release Oct 11 09:10:17 np0005481012 puppet-user[70213]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 13) Oct 11 09:10:17 np0005481012 puppet-user[70213]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 25) Oct 11 09:10:17 np0005481012 puppet-user[70213]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 13) Oct 11 09:10:17 np0005481012 puppet-user[70213]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 25) Oct 11 09:10:17 np0005481012 puppet-user[70213]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 13) Oct 11 09:10:17 np0005481012 puppet-user[70213]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 25) Oct 11 09:10:17 np0005481012 puppet-user[70213]: Warning: validate_legacy(validate_re) expects an Integer value, got String at ["/etc/puppet/modules/swift/manifests/ringbuilder/rebalance.pp", 23]: Oct 11 09:10:17 np0005481012 puppet-user[70213]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Oct 11 09:10:17 np0005481012 puppet-user[70213]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 0.28 seconds Oct 11 09:10:18 np0005481012 puppet-user[69988]: Warning: Scope(Apache::Vhost[swift-proxy-api-proxy]): Oct 11 09:10:18 np0005481012 puppet-user[69988]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Oct 11 09:10:18 np0005481012 puppet-user[69988]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Oct 11 09:10:18 np0005481012 puppet-user[69988]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Oct 11 09:10:18 np0005481012 puppet-user[69988]: file names. Oct 11 09:10:18 np0005481012 puppet-user[69988]: Oct 11 09:10:18 np0005481012 puppet-user[69988]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Oct 11 09:10:18 np0005481012 puppet-user[69988]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Oct 11 09:10:18 np0005481012 puppet-user[69988]: sanitized $servername parameter when not explicitly defined. Oct 11 09:10:18 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Swift/File[/var/lib/swift]/group: group changed 'root' to 'swift' Oct 11 09:10:18 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Swift/File[/var/run/swift]/group: group changed 'root' to 'swift' Oct 11 09:10:18 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Swift/File[/etc/swift/swift.conf]/owner: owner changed 'root' to 'swift' Oct 11 09:10:18 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_suffix]/value: value changed %SWIFT_HASH_PATH_SUFFIX% to sYBp133UVohfAgBBiftarMWKV Oct 11 09:10:18 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_prefix]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Swift/Swift_config[swift-constraints/max_header_size]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: Compiled catalog for np0005481012.ooo.test in environment production in 1.29 seconds Oct 11 09:10:18 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Create[object]/Exec[create_object]/returns: executed successfully Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Oct 11 09:10:18 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Create[account]/Exec[create_account]/returns: executed successfully Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}9b09fb609dd34c410cd09afce1c9ecf0b423566c600b084ecab9ed536f2431bc' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}4f73037b8196b0bab62c9c1419ef1b40c67b2055f31a8617a1adf8493a295c5b' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Rsync::Server/Concat[/etc/rsyncd.conf]/File[/etc/rsyncd.conf]/content: content changed '{sha256}189b30972178b755e8e70eab81b1d261c4def61b342300f11760e6f2e706ff64' to '{sha256}90c63bb71937e23a3b5e7a17b0b45511de89d0c1ec387c4f6f9be1aadf919d02' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Rsync::Server/Service[rsyncd]/ensure: ensure changed 0 to 'running' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[filter:cache/memcache_servers]/value: value changed 127.0.0.1:11211 to np0005481012.internalapi.ooo.test:11212,np0005481014.internalapi.ooo.test:11212,np0005481015.internalapi.ooo.test:11212 Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[filter:cache/tls_enabled]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[filter:proxy-logging/use]/value: value changed egg:swift#poxy_logging to egg:swift#proxy_logging Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[pipeline:main/pipeline]/value: value changed catch_errors proxy-logging cache proxy-server to catch_errors cache proxy-server Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/auto_create_account_prefix]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/concurrency]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/expiring_objects_account_name]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/interval]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/process]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/processes]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/reclaim_age]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/recon_cache_path]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/report_interval]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/log_facility]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/log_level]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift/File[/var/lib/swift]/group: group changed 'root' to 'swift' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift/File[/var/run/swift]/group: group changed 'root' to 'swift' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift/File[/etc/swift/swift.conf]/owner: owner changed 'root' to 'swift' Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_suffix]/value: value changed %SWIFT_HASH_PATH_SUFFIX% to sYBp133UVohfAgBBiftarMWKV Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_prefix]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift/Swift_config[swift-constraints/max_header_size]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/bind_ip]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/workers]/value: value changed 8 to 1 Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_name]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_facility]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_level]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_headers]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_address]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[pipeline:main/pipeline]/value: value changed catch_errors gatekeeper healthcheck proxy-logging cache container_sync bulk tempurl ratelimit copy container-quotas account-quotas slo dlo versioned_writes proxy-logging proxy-server to catch_errors gatekeeper healthcheck proxy-logging cache listing_formats ratelimit bulk tempurl formpost authtoken s3api s3token keystone staticweb copy container_quotas account_quotas slo dlo versioned_writes proxy-logging proxy-server Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_name]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_facility]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_level]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_address]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/log_handoffs]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/object_chunk_size]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/client_chunk_size]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/allow_account_management]/value: value changed true to True Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/account_autocreate]/value: value changed true to True Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/max_containers_per_account]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/node_timeout]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/recoverable_node_timeout]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_name]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_facility]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_level]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_headers]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_address]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Cache/Swift_proxy_config[filter:cache/memcache_servers]/value: value changed 127.0.0.1:11211 to np0005481012.internalapi.ooo.test:11212,np0005481014.internalapi.ooo.test:11212,np0005481015.internalapi.ooo.test:11212 Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Cache/Swift_proxy_config[filter:cache/tls_enabled]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Cache/Swift_proxy_config[filter:cache/memcache_max_connections]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Listing_formats/Swift_proxy_config[filter:listing_formats/use]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/clock_accuracy]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/max_sleep_time_seconds]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/log_sleep_time_seconds]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/rate_buffer_seconds]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/account_ratelimit]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/max_containers_per_extraction]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/max_failed_extractions]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/max_deletes_per_request]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/yield_frequency]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Formpost/Swift_proxy_config[filter:formpost/use]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/log_name]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/www_authenticate_uri]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/auth_url]/value: value changed http://127.0.0.1:5000 to https://overcloud.internalapi.ooo.test:5000 Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/auth_type]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/project_domain_id]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/user_domain_id]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/project_name]/value: value changed %SERVICE_TENANT_NAME% to service Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/username]/value: value changed %SERVICE_USER% to swift Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/password]/value: value changed [old secret redacted] to [new secret redacted] Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/region_name]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/delay_auth_decision]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/cache]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/include_service_catalog]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/interface]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::S3api/Swift_proxy_config[filter:s3api/use]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::S3api/Swift_proxy_config[filter:s3api/auth_pipeline_check]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/use]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Create[container]/Exec[create_container]/returns: executed successfully Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/auth_uri]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/reseller_prefix]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/delay_auth_decision]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/secret_cache_duration]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/auth_url]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/auth_type]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/username]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/password]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/project_name]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/project_domain_id]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/user_domain_id]/ensure: created Oct 11 09:10:18 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Keystone/Swift_proxy_config[filter:keystone/operator_roles]/value: value changed admin, SwiftOperator to admin, swiftoperator, ResellerAdmin Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Keystone/Swift_proxy_config[filter:keystone/reseller_prefix]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Keystone/Swift_proxy_config[filter:keystone/system_reader_roles]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Staticweb/Swift_proxy_config[filter:staticweb/use]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Staticweb/Swift_proxy_config[filter:staticweb/url_base]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Copy/Swift_proxy_config[filter:copy/object_post_as_copy]/value: value changed false to True Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Container_quotas/Swift_proxy_config[filter:container_quotas/use]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Account_quotas/Swift_proxy_config[filter:account_quotas/use]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/max_manifest_segments]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/max_manifest_size]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/min_segment_size]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/rate_limit_after_segment]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/rate_limit_segments_per_sec]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/max_get_time]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Dlo/Swift_proxy_config[filter:dlo/rate_limit_after_segment]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Dlo/Swift_proxy_config[filter:dlo/rate_limit_segments_per_sec]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Dlo/Swift_proxy_config[filter:dlo/max_get_time]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Versioned_writes/Swift_proxy_config[filter:versioned_writes/allow_versioned_writes]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Kms_keymaster/Swift_proxy_config[filter:kms_keymaster/use]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Kms_keymaster/Swift_proxy_config[filter:kms_keymaster/keymaster_config_path]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Encryption/Swift_proxy_config[filter:encryption/use]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Proxy::Encryption/Swift_proxy_config[filter:encryption/disable_encryption]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/api_class]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/username]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/project_name]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/project_domain_id]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/user_domain_id]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/meta_version_to_write]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Storage/File[/srv/node]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Storage/File[/srv/node/d1]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Storage::Account/Swift::Storage::Generic[account]/File[/etc/swift/account-server/]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Storage::Container/Swift::Storage::Generic[container]/File[/etc/swift/container-server/]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Storage::Object/Swift::Storage::Generic[object]/File[/etc/swift/object-server/]/ensure: created Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Storage::All/Swift::Storage::Server[6002]/Concat[/etc/swift/account-server.conf]/File[/etc/swift/account-server.conf]/ensure: defined content as '{sha256}ab6f11adca14e1165e4d4c1d5bab4b6e5237d623caaab6a446d063152c67e23a' Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Storage::All/Swift::Storage::Server[6001]/Concat[/etc/swift/container-server.conf]/File[/etc/swift/container-server.conf]/ensure: defined content as '{sha256}ecf2abeae1b74f4d454509e9962cefd253254cece1670b9780b1353f66f76b0e' Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Swift::Storage::All/Swift::Storage::Server[6000]/Concat[/etc/swift/object-server.conf]/File[/etc/swift/object-server.conf]/ensure: defined content as '{sha256}d37844c1efb04899848315d60b8da4dc0c8a84c5194b35da4abf6ed9eabea067' Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Proxy/Tripleo::Tls_proxy[swift-proxy-api]/Apache::Vhost[swift-proxy-api-proxy]/Concat[25-swift-proxy-api-proxy.conf]/File[/etc/httpd/conf.d/25-swift-proxy-api-proxy.conf]/ensure: defined content as '{sha256}f1c90ec7c315cebf3d85d98bad3284bf97caab2b80e4dbee169d4b42c40c7eb1' Oct 11 09:10:19 np0005481012 puppet-user[69988]: Notice: Applied catalog in 0.67 seconds Oct 11 09:10:19 np0005481012 puppet-user[69988]: Application: Oct 11 09:10:19 np0005481012 puppet-user[69988]: Initial environment: production Oct 11 09:10:19 np0005481012 puppet-user[69988]: Converged environment: production Oct 11 09:10:19 np0005481012 puppet-user[69988]: Run mode: user Oct 11 09:10:19 np0005481012 puppet-user[69988]: Changes: Oct 11 09:10:19 np0005481012 puppet-user[69988]: Total: 163 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Events: Oct 11 09:10:19 np0005481012 puppet-user[69988]: Success: 163 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Total: 163 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Resources: Oct 11 09:10:19 np0005481012 puppet-user[69988]: Changed: 163 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Out of sync: 163 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Skipped: 46 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Total: 330 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Time: Oct 11 09:10:19 np0005481012 puppet-user[69988]: Concat file: 0.00 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Service: 0.00 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Swift config: 0.00 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Concat fragment: 0.00 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Swift keymaster config: 0.01 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Swift object expirer config: 0.02 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Package: 0.03 Oct 11 09:10:19 np0005481012 puppet-user[69988]: File: 0.15 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Swift proxy config: 0.15 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Transaction evaluation: 0.66 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Catalog application: 0.67 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Config retrieval: 1.52 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Last run: 1760173819 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Resources: 0.00 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Total: 0.67 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Version: Oct 11 09:10:19 np0005481012 puppet-user[69988]: Config: 1760173816 Oct 11 09:10:19 np0005481012 puppet-user[69988]: Puppet: 7.10.0 Oct 11 09:10:19 np0005481012 puppet-user[70213]: Warning: Unexpected line: Ring file /etc/swift/object.ring.gz not found, probably it hasn't been written yet Oct 11 09:10:19 np0005481012 puppet-user[70213]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Oct 11 09:10:19 np0005481012 puppet-user[70213]: Warning: Unexpected line: There are no devices in this ring, or all devices have been deleted Oct 11 09:10:19 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.103:%PORT%/d1]/Ring_object_device[172.20.0.103:6000/d1]/ensure: created Oct 11 09:10:19 np0005481012 systemd[1]: libpod-179238bbccfb5420d48ab30bf6637a819799173de34677ba7b74c1fedbcc3960.scope: Deactivated successfully. Oct 11 09:10:19 np0005481012 systemd[1]: libpod-179238bbccfb5420d48ab30bf6637a819799173de34677ba7b74c1fedbcc3960.scope: Consumed 4.557s CPU time. Oct 11 09:10:19 np0005481012 puppet-user[70213]: Warning: Unexpected line: Ring file /etc/swift/container.ring.gz not found, probably it hasn't been written yet Oct 11 09:10:19 np0005481012 puppet-user[70213]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Oct 11 09:10:19 np0005481012 puppet-user[70213]: Warning: Unexpected line: There are no devices in this ring, or all devices have been deleted Oct 11 09:10:19 np0005481012 podman[69893]: 2025-10-11 09:10:19.821007886 +0000 UTC m=+4.936941777 container died 179238bbccfb5420d48ab30bf6637a819799173de34677ba7b74c1fedbcc3960 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-type=git, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.tags=rhosp osp openstack osp-17.1, maintainer=OpenStack TripleO Team, batch=17.1_20250721.1, name=rhosp17/openstack-swift-proxy-server, vcs-ref=2b1b2ddf50ac77b76e4bf1d1c4aad35d9d39bb77, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-swift-proxy-server/images/17.1.9-1, container_name=container-puppet-swift, build-date=2025-07-21T14:48:37, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.9, tcib_managed=true, config_id=tripleo_puppet_step1, io.openshift.expose-services=, io.buildah.version=1.33.12, release=1, architecture=x86_64, managed_by=tripleo_ansible, com.redhat.component=openstack-swift-proxy-server-container) Oct 11 09:10:19 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-179238bbccfb5420d48ab30bf6637a819799173de34677ba7b74c1fedbcc3960-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:19 np0005481012 systemd[1]: var-lib-containers-storage-overlay-a30e8178a3ef891156d0378004a627f43940991fcf5df9ecdcb1de1d93218bc1-merged.mount: Deactivated successfully. Oct 11 09:10:19 np0005481012 podman[70602]: 2025-10-11 09:10:19.918258514 +0000 UTC m=+0.086932460 container cleanup 179238bbccfb5420d48ab30bf6637a819799173de34677ba7b74c1fedbcc3960 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, io.buildah.version=1.33.12, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, name=rhosp17/openstack-swift-proxy-server, managed_by=tripleo_ansible, container_name=container-puppet-swift, batch=17.1_20250721.1, com.redhat.component=openstack-swift-proxy-server-container, release=1, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/agreements, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-type=git, vendor=Red Hat, Inc., config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, io.openshift.expose-services=, build-date=2025-07-21T14:48:37, config_id=tripleo_puppet_step1, vcs-ref=2b1b2ddf50ac77b76e4bf1d1c4aad35d9d39bb77, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-swift-proxy-server/images/17.1.9-1, tcib_managed=true, version=17.1.9) Oct 11 09:10:19 np0005481012 systemd[1]: libpod-conmon-179238bbccfb5420d48ab30bf6637a819799173de34677ba7b74c1fedbcc3960.scope: Deactivated successfully. Oct 11 09:10:19 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-swift --conmon-pidfile /run/container-puppet-swift.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server --env NAME=swift --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::swift::proxy#012#012class xinetd() {}#012define xinetd::service($bind='',$port='',$server='',$server_args='') {}#012noop_resource('service')#012include tripleo::profile::base::swift::storage --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-swift --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-swift.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Oct 11 09:10:20 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.103:%PORT%/d1]/Ring_container_device[172.20.0.103:6001/d1]/ensure: created Oct 11 09:10:20 np0005481012 puppet-user[70213]: Warning: Unexpected line: Ring file /etc/swift/account.ring.gz not found, probably it hasn't been written yet Oct 11 09:10:20 np0005481012 puppet-user[70213]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Oct 11 09:10:20 np0005481012 puppet-user[70213]: Warning: Unexpected line: There are no devices in this ring, or all devices have been deleted Oct 11 09:10:20 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.103:%PORT%/d1]/Ring_account_device[172.20.0.103:6002/d1]/ensure: created Oct 11 09:10:21 np0005481012 puppet-user[70213]: Warning: Unexpected line: Ring file /etc/swift/object.ring.gz not found, probably it hasn't been written yet Oct 11 09:10:21 np0005481012 puppet-user[70213]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Oct 11 09:10:21 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.104:%PORT%/d1]/Ring_object_device[172.20.0.104:6000/d1]/ensure: created Oct 11 09:10:21 np0005481012 puppet-user[70213]: Warning: Unexpected line: Ring file /etc/swift/container.ring.gz not found, probably it hasn't been written yet Oct 11 09:10:21 np0005481012 puppet-user[70213]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Oct 11 09:10:22 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.104:%PORT%/d1]/Ring_container_device[172.20.0.104:6001/d1]/ensure: created Oct 11 09:10:22 np0005481012 puppet-user[70213]: Warning: Unexpected line: Ring file /etc/swift/account.ring.gz not found, probably it hasn't been written yet Oct 11 09:10:22 np0005481012 puppet-user[70213]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Oct 11 09:10:22 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.104:%PORT%/d1]/Ring_account_device[172.20.0.104:6002/d1]/ensure: created Oct 11 09:10:22 np0005481012 puppet-user[70213]: Warning: Unexpected line: Ring file /etc/swift/object.ring.gz not found, probably it hasn't been written yet Oct 11 09:10:22 np0005481012 puppet-user[70213]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Oct 11 09:10:23 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.105:%PORT%/d1]/Ring_object_device[172.20.0.105:6000/d1]/ensure: created Oct 11 09:10:23 np0005481012 puppet-user[70213]: Warning: Unexpected line: Ring file /etc/swift/container.ring.gz not found, probably it hasn't been written yet Oct 11 09:10:23 np0005481012 puppet-user[70213]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Oct 11 09:10:23 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.105:%PORT%/d1]/Ring_container_device[172.20.0.105:6001/d1]/ensure: created Oct 11 09:10:24 np0005481012 puppet-user[70213]: Warning: Unexpected line: Ring file /etc/swift/account.ring.gz not found, probably it hasn't been written yet Oct 11 09:10:24 np0005481012 puppet-user[70213]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Oct 11 09:10:24 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.105:%PORT%/d1]/Ring_account_device[172.20.0.105:6002/d1]/ensure: created Oct 11 09:10:24 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Rebalance[object]/Exec[rebalance_object]: Triggered 'refresh' from 3 events Oct 11 09:10:25 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Rebalance[account]/Exec[rebalance_account]: Triggered 'refresh' from 3 events Oct 11 09:10:25 np0005481012 puppet-user[70213]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Rebalance[container]/Exec[rebalance_container]: Triggered 'refresh' from 3 events Oct 11 09:10:25 np0005481012 puppet-user[70213]: Notice: Applied catalog in 7.48 seconds Oct 11 09:10:25 np0005481012 puppet-user[70213]: Application: Oct 11 09:10:25 np0005481012 puppet-user[70213]: Initial environment: production Oct 11 09:10:25 np0005481012 puppet-user[70213]: Converged environment: production Oct 11 09:10:25 np0005481012 puppet-user[70213]: Run mode: user Oct 11 09:10:25 np0005481012 puppet-user[70213]: Changes: Oct 11 09:10:25 np0005481012 puppet-user[70213]: Total: 21 Oct 11 09:10:25 np0005481012 puppet-user[70213]: Events: Oct 11 09:10:25 np0005481012 puppet-user[70213]: Success: 21 Oct 11 09:10:25 np0005481012 puppet-user[70213]: Total: 21 Oct 11 09:10:25 np0005481012 puppet-user[70213]: Resources: Oct 11 09:10:25 np0005481012 puppet-user[70213]: Skipped: 16 Oct 11 09:10:25 np0005481012 puppet-user[70213]: Changed: 21 Oct 11 09:10:25 np0005481012 puppet-user[70213]: Out of sync: 21 Oct 11 09:10:25 np0005481012 puppet-user[70213]: Restarted: 3 Oct 11 09:10:25 np0005481012 puppet-user[70213]: Total: 38 Oct 11 09:10:25 np0005481012 puppet-user[70213]: Time: Oct 11 09:10:25 np0005481012 puppet-user[70213]: Swift config: 0.00 Oct 11 09:10:25 np0005481012 puppet-user[70213]: File: 0.00 Oct 11 09:10:25 np0005481012 puppet-user[70213]: Config retrieval: 0.36 Oct 11 09:10:25 np0005481012 puppet-user[70213]: Exec: 0.91 Oct 11 09:10:25 np0005481012 puppet-user[70213]: Ring account device: 1.75 Oct 11 09:10:25 np0005481012 puppet-user[70213]: Ring container device: 1.81 Oct 11 09:10:25 np0005481012 puppet-user[70213]: Ring object device: 1.83 Oct 11 09:10:25 np0005481012 puppet-user[70213]: Last run: 1760173825 Oct 11 09:10:25 np0005481012 puppet-user[70213]: Transaction evaluation: 7.48 Oct 11 09:10:25 np0005481012 puppet-user[70213]: Catalog application: 7.48 Oct 11 09:10:25 np0005481012 puppet-user[70213]: Total: 7.48 Oct 11 09:10:25 np0005481012 puppet-user[70213]: Version: Oct 11 09:10:25 np0005481012 puppet-user[70213]: Config: 1760173817 Oct 11 09:10:25 np0005481012 puppet-user[70213]: Puppet: 7.10.0 Oct 11 09:10:25 np0005481012 systemd[1]: libpod-9d4de267af0853df51c5c28f56c9461e7d06c553b0772362a8d4dcb6050f50e5.scope: Deactivated successfully. Oct 11 09:10:25 np0005481012 systemd[1]: libpod-9d4de267af0853df51c5c28f56c9461e7d06c553b0772362a8d4dcb6050f50e5.scope: Consumed 10.188s CPU time. Oct 11 09:10:25 np0005481012 podman[70151]: 2025-10-11 09:10:25.958762313 +0000 UTC m=+10.480980529 container died 9d4de267af0853df51c5c28f56c9461e7d06c553b0772362a8d4dcb6050f50e5 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, com.redhat.license_terms=https://www.redhat.com/agreements, config_id=tripleo_puppet_step1, distribution-scope=public, com.redhat.component=openstack-swift-proxy-server-container, batch=17.1_20250721.1, vcs-ref=2b1b2ddf50ac77b76e4bf1d1c4aad35d9d39bb77, vcs-type=git, version=17.1.9, release=1, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, container_name=container-puppet-swift_ringbuilder, build-date=2025-07-21T14:48:37, tcib_managed=true, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vendor=Red Hat, Inc., io.buildah.version=1.33.12, architecture=x86_64, name=rhosp17/openstack-swift-proxy-server, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-swift-proxy-server/images/17.1.9-1, description=Red Hat OpenStack Platform 17.1 swift-proxy-server) Oct 11 09:10:26 np0005481012 systemd[1]: tmp-crun.QBQo46.mount: Deactivated successfully. Oct 11 09:10:26 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-9d4de267af0853df51c5c28f56c9461e7d06c553b0772362a8d4dcb6050f50e5-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:26 np0005481012 systemd[1]: var-lib-containers-storage-overlay-973b4eb7209c096d6b85a219137a56dfb018bd659c6daeb4fb4c3303c2628058-merged.mount: Deactivated successfully. Oct 11 09:10:26 np0005481012 podman[70712]: 2025-10-11 09:10:26.077908089 +0000 UTC m=+0.110174080 container cleanup 9d4de267af0853df51c5c28f56c9461e7d06c553b0772362a8d4dcb6050f50e5 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, com.redhat.license_terms=https://www.redhat.com/agreements, config_id=tripleo_puppet_step1, release=1, vcs-ref=2b1b2ddf50ac77b76e4bf1d1c4aad35d9d39bb77, vcs-type=git, maintainer=OpenStack TripleO Team, container_name=container-puppet-swift_ringbuilder, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, name=rhosp17/openstack-swift-proxy-server, build-date=2025-07-21T14:48:37, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, version=17.1.9, distribution-scope=public, managed_by=tripleo_ansible, architecture=x86_64, batch=17.1_20250721.1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-swift-proxy-server/images/17.1.9-1, com.redhat.component=openstack-swift-proxy-server-container, io.openshift.tags=rhosp osp openstack osp-17.1, tcib_managed=true, vendor=Red Hat, Inc., io.buildah.version=1.33.12) Oct 11 09:10:26 np0005481012 systemd[1]: libpod-conmon-9d4de267af0853df51c5c28f56c9461e7d06c553b0772362a8d4dcb6050f50e5.scope: Deactivated successfully. Oct 11 09:10:26 np0005481012 python3[64830]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-swift_ringbuilder --conmon-pidfile /run/container-puppet-swift_ringbuilder.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005481012 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball --env NAME=swift_ringbuilder --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::swift::ringbuilder#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-swift_ringbuilder --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005481012', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-swift_ringbuilder.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Oct 11 09:10:27 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 09:10:27 np0005481012 python3[70763]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 09:10:27 np0005481012 python3[70795]: ansible-stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 09:10:28 np0005481012 python3[70845]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-container-shutdown follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 09:10:28 np0005481012 python3[70888]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760173828.2711244-176336-247588337446169/source dest=/usr/libexec/tripleo-container-shutdown mode=0700 owner=root group=root _original_basename=tripleo-container-shutdown follow=False checksum=7d67b1986212f5548057505748cd74cfcf9c0d35 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 09:10:29 np0005481012 python3[70950]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-start-podman-container follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 09:10:29 np0005481012 python3[70993]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760173829.1832907-176336-191704184197008/source dest=/usr/libexec/tripleo-start-podman-container mode=0700 owner=root group=root _original_basename=tripleo-start-podman-container follow=False checksum=536965633b8d3b1ce794269ffb07be0105a560a0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 09:10:30 np0005481012 python3[71055]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/tripleo-container-shutdown.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 09:10:30 np0005481012 python3[71098]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760173830.2148042-176399-120862022348322/source dest=/usr/lib/systemd/system/tripleo-container-shutdown.service mode=0644 owner=root group=root _original_basename=tripleo-container-shutdown-service follow=False checksum=66c1d41406ba8714feb9ed0a35259a7a57ef9707 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 09:10:31 np0005481012 python3[71160]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 09:10:31 np0005481012 python3[71203]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760173831.2246518-176525-59901270076685/source dest=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset mode=0644 owner=root group=root _original_basename=91-tripleo-container-shutdown-preset follow=False checksum=bccb1207dcbcfaa5ca05f83c8f36ce4c2460f081 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 09:10:32 np0005481012 python3[71233]: ansible-systemd Invoked with name=tripleo-container-shutdown state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 09:10:32 np0005481012 systemd[1]: Reloading. Oct 11 09:10:32 np0005481012 systemd-rc-local-generator[71254]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 09:10:32 np0005481012 systemd-sysv-generator[71261]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 09:10:32 np0005481012 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 09:10:32 np0005481012 systemd[1]: Reloading. Oct 11 09:10:32 np0005481012 systemd-rc-local-generator[71298]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 09:10:32 np0005481012 systemd-sysv-generator[71302]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 09:10:32 np0005481012 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 09:10:33 np0005481012 systemd[1]: Starting TripleO Container Shutdown... Oct 11 09:10:33 np0005481012 systemd[1]: Finished TripleO Container Shutdown. Oct 11 09:10:33 np0005481012 python3[71357]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/netns-placeholder.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 09:10:34 np0005481012 python3[71400]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760173833.2186208-176600-168592711559444/source dest=/usr/lib/systemd/system/netns-placeholder.service mode=0644 owner=root group=root _original_basename=netns-placeholder-service follow=False checksum=8e9c6d5ce3a6e7f71c18780ec899f32f23de4c71 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 09:10:34 np0005481012 python3[71462]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-netns-placeholder.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 09:10:35 np0005481012 python3[71505]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760173834.263216-176647-148634687939007/source dest=/usr/lib/systemd/system-preset/91-netns-placeholder.preset mode=0644 owner=root group=root _original_basename=91-netns-placeholder-preset follow=False checksum=28b7b9aa893525d134a1eeda8a0a48fb25b736b9 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 09:10:35 np0005481012 python3[71535]: ansible-systemd Invoked with name=netns-placeholder state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 09:10:35 np0005481012 systemd[1]: Reloading. Oct 11 09:10:35 np0005481012 systemd-rc-local-generator[71560]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 09:10:35 np0005481012 systemd-sysv-generator[71565]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 09:10:35 np0005481012 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 09:10:35 np0005481012 systemd[1]: Reloading. Oct 11 09:10:35 np0005481012 systemd-sysv-generator[71600]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 09:10:36 np0005481012 systemd-rc-local-generator[71596]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 09:10:36 np0005481012 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 09:10:36 np0005481012 systemd[1]: Starting Create netns directory... Oct 11 09:10:36 np0005481012 systemd[1]: run-netns-placeholder.mount: Deactivated successfully. Oct 11 09:10:36 np0005481012 systemd[1]: netns-placeholder.service: Deactivated successfully. Oct 11 09:10:36 np0005481012 systemd[1]: Finished Create netns directory. Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config Invoked with update_config_hash_only=True no_archive=True check_mode=False config_vol_prefix=/var/lib/config-data debug=False net_host=True puppet_config= short_hostname= step=6 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for memcached, new hash: 7cabf7af6dffa9451de7685929b15d94 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for metrics_qdr, new hash: 90584b63f74acd2af6785b0ea458a356 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for mysql_bootstrap, new hash: d790aa0f75198179a1842be7c5662142 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for rabbitmq_bootstrap, new hash: 9c4e4bc0cbf263e81bcbe5493649df08 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for redis_tls_proxy, new hash: ef8c949a885ec409d680ee6ff31e91e1 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for clustercheck, new hash: 7f9a3b710cc6eab72ed4f6dc0b1acbaf Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for horizon_fix_perms, new hash: ee7e7313d7eecfcaf3aa7b15a9c9b70a Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for mysql_wait_bundle, new hash: d790aa0f75198179a1842be7c5662142 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for cinder_api_db_sync, new hash: fd0121dfaaf266bf453c2f4dc3aa8e36 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for collectd, new hash: e16153973e33c69ef6071b3b67d72d70 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_db_sync, new hash: d6a46868acd07fc2d4c881ef1cc10556-90c723b8fbdf6a45270d2a0dc792e2e9 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for heat_engine_db_sync, new hash: 89c444df5345c174322bed4820d2eb1f Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for horizon, new hash: ee7e7313d7eecfcaf3aa7b15a9c9b70a Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for iscsid, new hash: 90c723b8fbdf6a45270d2a0dc792e2e9 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for keystone, new hash: 7dadfae029942b6ede207a989af3e3ed Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for keystone_cron, new hash: 7dadfae029942b6ede207a989af3e3ed Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for keystone_db_sync, new hash: 7dadfae029942b6ede207a989af3e3ed Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for manila_api_db_sync, new hash: 485faeb26bc3f8d78058e008b640a924 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for neutron_db_sync, new hash: 706ff86b1b5264880358def9c5e45d93 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for nova_api_db_sync, new hash: d9557c6d056f8f57d81096b350736326 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for nova_api_ensure_default_cells, new hash: d9557c6d056f8f57d81096b350736326 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for nova_db_sync, new hash: d9557c6d056f8f57d81096b350736326 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for placement_api_db_sync, new hash: ad9a7b8fe9c9eb6fd2f02ee52baea99f Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for rsyslog, new hash: 55af5a28d40cbd1e6f7afcf7c28f239c Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for swift_copy_rings, new hash: daf62b46d840b3dcee75a1746df4229b-0ca1eeb87a2a6dc37cf4443b1e17ec8a Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for ceilometer_agent_central, new hash: 7de53c8c86927b549571c453bff1b485 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for ceilometer_agent_notification, new hash: 7de53c8c86927b549571c453bff1b485 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for cinder_api, new hash: fd0121dfaaf266bf453c2f4dc3aa8e36 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for cinder_api_cron, new hash: fd0121dfaaf266bf453c2f4dc3aa8e36 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for cinder_scheduler, new hash: fd0121dfaaf266bf453c2f4dc3aa8e36 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for glance_api, new hash: d6a46868acd07fc2d4c881ef1cc10556-90c723b8fbdf6a45270d2a0dc792e2e9 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_cron, new hash: d6a46868acd07fc2d4c881ef1cc10556 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_internal, new hash: 3498f657e92e2a7f5117d1b58dd1d1a9-90c723b8fbdf6a45270d2a0dc792e2e9 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_internal_tls_proxy, new hash: 3498f657e92e2a7f5117d1b58dd1d1a9 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_tls_proxy, new hash: d6a46868acd07fc2d4c881ef1cc10556 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for heat_api, new hash: 88f090dd9b02bb1cd713d77e2b3fbae9 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for heat_api_cfn, new hash: c1c06a14503f1e9b328fe587cefa1642 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for heat_api_cron, new hash: 88f090dd9b02bb1cd713d77e2b3fbae9 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for heat_engine, new hash: 89c444df5345c174322bed4820d2eb1f Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for logrotate_crond, new hash: 53ed83bb0cae779ff95edb2002262c6f Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for manila_api, new hash: 485faeb26bc3f8d78058e008b640a924 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for manila_api_cron, new hash: 485faeb26bc3f8d78058e008b640a924 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for manila_scheduler, new hash: 485faeb26bc3f8d78058e008b640a924 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for neutron_api, new hash: 706ff86b1b5264880358def9c5e45d93 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for neutron_server_tls_proxy, new hash: 706ff86b1b5264880358def9c5e45d93 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for nova_api, new hash: d9557c6d056f8f57d81096b350736326 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for nova_api_cron, new hash: d9557c6d056f8f57d81096b350736326 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for nova_conductor, new hash: d9557c6d056f8f57d81096b350736326 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for nova_metadata, new hash: a270f27f77b0d4cc35fdcb4d20d40747 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for nova_scheduler, new hash: d9557c6d056f8f57d81096b350736326 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for nova_vnc_proxy, new hash: d9557c6d056f8f57d81096b350736326 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for nova_wait_for_api_service, new hash: d9557c6d056f8f57d81096b350736326 Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for placement_api, new hash: ad9a7b8fe9c9eb6fd2f02ee52baea99f Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for placement_wait_for_service, new hash: ad9a7b8fe9c9eb6fd2f02ee52baea99f Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_auditor, new hash: daf62b46d840b3dcee75a1746df4229b Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_reaper, new hash: daf62b46d840b3dcee75a1746df4229b Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_replicator, new hash: daf62b46d840b3dcee75a1746df4229b Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_server, new hash: daf62b46d840b3dcee75a1746df4229b Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_auditor, new hash: daf62b46d840b3dcee75a1746df4229b Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_replicator, new hash: daf62b46d840b3dcee75a1746df4229b Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_server, new hash: daf62b46d840b3dcee75a1746df4229b Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_updater, new hash: daf62b46d840b3dcee75a1746df4229b Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_auditor, new hash: daf62b46d840b3dcee75a1746df4229b Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_expirer, new hash: daf62b46d840b3dcee75a1746df4229b Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_replicator, new hash: daf62b46d840b3dcee75a1746df4229b Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_server, new hash: daf62b46d840b3dcee75a1746df4229b Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_updater, new hash: daf62b46d840b3dcee75a1746df4229b Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for swift_proxy, new hash: daf62b46d840b3dcee75a1746df4229b Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for swift_proxy_tls_proxy, new hash: daf62b46d840b3dcee75a1746df4229b Oct 11 09:10:36 np0005481012 python3[71628]: ansible-container_puppet_config [WARNING] Config change detected for swift_rsync, new hash: daf62b46d840b3dcee75a1746df4229b Oct 11 09:10:37 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 09:10:37 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 09:10:38 np0005481012 python3[71686]: ansible-tripleo_container_manage Invoked with config_id=tripleo_step1 config_dir=/var/lib/tripleo-config/container-startup-config/step_1 config_patterns=*.json config_overrides={} concurrency=5 log_base_path=/var/log/containers/stdouts debug=False Oct 11 09:10:38 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 09:10:38 np0005481012 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 09:10:38 np0005481012 podman[71851]: 2025-10-11 09:10:38.904286571 +0000 UTC m=+0.056226300 container create 85c6d98562b73f40e6b53a4b9c310e764f8745ad7d3d738226bc39232f4a047b (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, build-date=2025-07-21T13:07:59, version=17.1.9, tcib_managed=true, vcs-ref=4a9cf7084a7631a8cf28014f76f8f9d6da5b1fed, managed_by=tripleo_ansible, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, batch=17.1_20250721.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, name=rhosp17/openstack-qdrouterd, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-qdrouterd/images/17.1.9-1, architecture=x86_64, container_name=metrics_qdr_init_logs, release=1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/agreements, com.redhat.component=openstack-qdrouterd-container, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1, io.buildah.version=1.33.12, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 qdrouterd) Oct 11 09:10:38 np0005481012 podman[71843]: 2025-10-11 09:10:38.929038637 +0000 UTC m=+0.089458108 container create 8f3e3daa0e5814e7d8989deac7c3820661e9bfe619c2a99a836c67ecaca1a228 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, io.openshift.expose-services=, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step1, distribution-scope=public, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20250721.1, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 mariadb, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, container_name=mysql_data_ownership, vcs-type=git, io.buildah.version=1.33.12, build-date=2025-07-21T12:58:45, com.redhat.license_terms=https://www.redhat.com/agreements, version=17.1.9, release=1, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-mariadb, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, io.openshift.tags=rhosp osp openstack osp-17.1, com.redhat.component=openstack-mariadb-container) Oct 11 09:10:38 np0005481012 systemd[1]: Started libpod-conmon-85c6d98562b73f40e6b53a4b9c310e764f8745ad7d3d738226bc39232f4a047b.scope. Oct 11 09:10:38 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:38 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/c48c85f00212c42ddd5993347e21e4002c13245ac12b0390141913b00da43aa5/merged/var/log/qdrouterd supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:38 np0005481012 podman[71857]: 2025-10-11 09:10:38.955646811 +0000 UTC m=+0.107705283 container create a120521e907fc0a2544999394b6e33e7cf8397637e52d3e98fe9a7d12eb626ca (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=redis_tls_proxy, com.redhat.component=openstack-redis-container, vcs-type=git, build-date=2025-07-21T13:10:13, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-redis/images/17.1.9-1, managed_by=tripleo_ansible, io.buildah.version=1.33.12, maintainer=OpenStack TripleO Team, release=1, io.openshift.tags=rhosp osp openstack osp-17.1, version=17.1.9, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ef8c949a885ec409d680ee6ff31e91e1'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, description=Red Hat OpenStack Platform 17.1 redis, name=rhosp17/openstack-redis, com.redhat.license_terms=https://www.redhat.com/agreements, container_name=redis_tls_proxy, vendor=Red Hat, Inc., architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, summary=Red Hat OpenStack Platform 17.1 redis, io.openshift.expose-services=, batch=17.1_20250721.1, config_id=tripleo_step1, tcib_managed=true, vcs-ref=ff6161246d28f7887060a5133e281d72aa432576) Oct 11 09:10:38 np0005481012 podman[71851]: 2025-10-11 09:10:38.962242924 +0000 UTC m=+0.114182633 container init 85c6d98562b73f40e6b53a4b9c310e764f8745ad7d3d738226bc39232f4a047b (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1, container_name=metrics_qdr_init_logs, release=1, com.redhat.license_terms=https://www.redhat.com/agreements, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2025-07-21T13:07:59, com.redhat.component=openstack-qdrouterd-container, io.openshift.expose-services=, vcs-type=git, managed_by=tripleo_ansible, batch=17.1_20250721.1, distribution-scope=public, version=17.1.9, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-qdrouterd/images/17.1.9-1, name=rhosp17/openstack-qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, io.buildah.version=1.33.12, tcib_managed=true, vcs-ref=4a9cf7084a7631a8cf28014f76f8f9d6da5b1fed, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 qdrouterd) Oct 11 09:10:38 np0005481012 podman[71874]: 2025-10-11 09:10:38.966862838 +0000 UTC m=+0.104549006 container create ca1cf214058ce5187b0cd87d3add8e2f591695f8e7b5ed13c0e6c237c6cf9d65 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, io.openshift.tags=rhosp osp openstack osp-17.1, vcs-ref=c5579e43aadfadb0a3c02e9b1c0ac35d1b75fcbe, tcib_managed=true, distribution-scope=public, vcs-type=git, build-date=2025-07-21T12:58:43, batch=17.1_20250721.1, config_id=tripleo_step1, architecture=x86_64, com.redhat.component=openstack-memcached-container, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-memcached/images/17.1.9-1, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7cabf7af6dffa9451de7685929b15d94'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, name=rhosp17/openstack-memcached, io.openshift.expose-services=, version=17.1.9, com.redhat.license_terms=https://www.redhat.com/agreements, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, io.buildah.version=1.33.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, summary=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, release=1) Oct 11 09:10:38 np0005481012 podman[71851]: 2025-10-11 09:10:38.872519869 +0000 UTC m=+0.024459588 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Oct 11 09:10:38 np0005481012 systemd[1]: Started libpod-conmon-8f3e3daa0e5814e7d8989deac7c3820661e9bfe619c2a99a836c67ecaca1a228.scope. Oct 11 09:10:38 np0005481012 systemd[1]: libpod-85c6d98562b73f40e6b53a4b9c310e764f8745ad7d3d738226bc39232f4a047b.scope: Deactivated successfully. Oct 11 09:10:38 np0005481012 podman[71843]: 2025-10-11 09:10:38.883558961 +0000 UTC m=+0.043978472 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Oct 11 09:10:38 np0005481012 systemd[1]: Started libpod-conmon-ca1cf214058ce5187b0cd87d3add8e2f591695f8e7b5ed13c0e6c237c6cf9d65.scope. Oct 11 09:10:38 np0005481012 podman[71900]: 2025-10-11 09:10:38.984706169 +0000 UTC m=+0.085456045 container create 4dd97b06eca64eba837edb2dcdfa316fe7d2a53737aaf3768dcb504fe2e0fb0f (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1, batch=17.1_20250721.1, tcib_managed=true, version=17.1.9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, io.buildah.version=1.33.12, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, container_name=rabbitmq_bootstrap, io.openshift.expose-services=, config_id=tripleo_step1, summary=Red Hat OpenStack Platform 17.1 rabbitmq, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-rabbitmq/images/17.1.9-1, distribution-scope=public, architecture=x86_64, maintainer=OpenStack TripleO Team, vcs-ref=b30dae4cd2f9a99467af45e3d985bc71318ed98b, release=1, name=rhosp17/openstack-rabbitmq, com.redhat.license_terms=https://www.redhat.com/agreements, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1760169090', 'TRIPLEO_CONFIG_HASH': '9c4e4bc0cbf263e81bcbe5493649df08'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.component=openstack-rabbitmq-container, build-date=2025-07-21T13:08:05) Oct 11 09:10:38 np0005481012 podman[71857]: 2025-10-11 09:10:38.885665536 +0000 UTC m=+0.037724078 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Oct 11 09:10:38 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:38 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:38 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/c6b05ca3e202da399a74e51fc0c253ddee9aacf815a2806f7954f1e8f7c73175/merged/var/lib/mysql supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:38 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/324a075bc7334e33dec56e21e9c6193301f65dd3920e246d57d796a14f3fcf14/merged/var/log/memcached supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:38 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/324a075bc7334e33dec56e21e9c6193301f65dd3920e246d57d796a14f3fcf14/merged/var/lib/kolla/config_files/src supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:39 np0005481012 systemd[1]: Started libpod-conmon-4dd97b06eca64eba837edb2dcdfa316fe7d2a53737aaf3768dcb504fe2e0fb0f.scope. Oct 11 09:10:39 np0005481012 podman[71843]: 2025-10-11 09:10:39.004111729 +0000 UTC m=+0.164531200 container init 8f3e3daa0e5814e7d8989deac7c3820661e9bfe619c2a99a836c67ecaca1a228 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, version=17.1.9, config_id=tripleo_step1, maintainer=OpenStack TripleO Team, container_name=mysql_data_ownership, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, vendor=Red Hat, Inc., batch=17.1_20250721.1, name=rhosp17/openstack-mariadb, build-date=2025-07-21T12:58:45, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/agreements, release=1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, io.buildah.version=1.33.12, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, com.redhat.component=openstack-mariadb-container, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1, tcib_managed=true) Oct 11 09:10:39 np0005481012 podman[71843]: 2025-10-11 09:10:39.010007192 +0000 UTC m=+0.170426653 container start 8f3e3daa0e5814e7d8989deac7c3820661e9bfe619c2a99a836c67ecaca1a228 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, io.buildah.version=1.33.12, build-date=2025-07-21T12:58:45, vendor=Red Hat, Inc., release=1, managed_by=tripleo_ansible, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/agreements, version=17.1.9, io.openshift.tags=rhosp osp openstack osp-17.1, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, container_name=mysql_data_ownership, batch=17.1_20250721.1, name=rhosp17/openstack-mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step1, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-mariadb-container, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb) Oct 11 09:10:39 np0005481012 podman[71843]: 2025-10-11 09:10:39.010217058 +0000 UTC m=+0.170636529 container attach 8f3e3daa0e5814e7d8989deac7c3820661e9bfe619c2a99a836c67ecaca1a228 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, managed_by=tripleo_ansible, container_name=mysql_data_ownership, batch=17.1_20250721.1, architecture=x86_64, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, vcs-type=git, name=rhosp17/openstack-mariadb, tcib_managed=true, vendor=Red Hat, Inc., io.buildah.version=1.33.12, build-date=2025-07-21T12:58:45, config_id=tripleo_step1, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, release=1, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-mariadb-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.9, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1, com.redhat.license_terms=https://www.redhat.com/agreements) Oct 11 09:10:39 np0005481012 podman[71843]: 2025-10-11 09:10:39.015284325 +0000 UTC m=+0.175703816 container died 8f3e3daa0e5814e7d8989deac7c3820661e9bfe619c2a99a836c67ecaca1a228 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, name=rhosp17/openstack-mariadb, com.redhat.component=openstack-mariadb-container, distribution-scope=public, release=1, io.openshift.expose-services=, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, container_name=mysql_data_ownership, architecture=x86_64, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, io.openshift.tags=rhosp osp openstack osp-17.1, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.9, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, batch=17.1_20250721.1, io.buildah.version=1.33.12, config_id=tripleo_step1, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, build-date=2025-07-21T12:58:45, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/agreements) Oct 11 09:10:39 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:39 np0005481012 systemd[1]: libpod-8f3e3daa0e5814e7d8989deac7c3820661e9bfe619c2a99a836c67ecaca1a228.scope: Deactivated successfully. Oct 11 09:10:39 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/ad822f3ee93ed1109b7ad37ffa97ddf7416a421db079a7618a508f7252348a8e/merged/var/lib/rabbitmq supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:39 np0005481012 podman[71874]: 2025-10-11 09:10:38.921982819 +0000 UTC m=+0.059669007 image pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Oct 11 09:10:39 np0005481012 systemd[1]: Started libpod-conmon-a120521e907fc0a2544999394b6e33e7cf8397637e52d3e98fe9a7d12eb626ca.scope. Oct 11 09:10:39 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:39 np0005481012 podman[71900]: 2025-10-11 09:10:39.030353681 +0000 UTC m=+0.131103557 container init 4dd97b06eca64eba837edb2dcdfa316fe7d2a53737aaf3768dcb504fe2e0fb0f (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1760169090', 'TRIPLEO_CONFIG_HASH': '9c4e4bc0cbf263e81bcbe5493649df08'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-rabbitmq/images/17.1.9-1, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, build-date=2025-07-21T13:08:05, batch=17.1_20250721.1, vcs-type=git, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-ref=b30dae4cd2f9a99467af45e3d985bc71318ed98b, container_name=rabbitmq_bootstrap, com.redhat.component=openstack-rabbitmq-container, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.buildah.version=1.33.12, architecture=x86_64, version=17.1.9, config_id=tripleo_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1, distribution-scope=public, name=rhosp17/openstack-rabbitmq, release=1) Oct 11 09:10:39 np0005481012 podman[71900]: 2025-10-11 09:10:38.937765897 +0000 UTC m=+0.038515793 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Oct 11 09:10:39 np0005481012 podman[71900]: 2025-10-11 09:10:39.038184173 +0000 UTC m=+0.138934049 container start 4dd97b06eca64eba837edb2dcdfa316fe7d2a53737aaf3768dcb504fe2e0fb0f (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, summary=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-type=git, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-ref=b30dae4cd2f9a99467af45e3d985bc71318ed98b, description=Red Hat OpenStack Platform 17.1 rabbitmq, build-date=2025-07-21T13:08:05, name=rhosp17/openstack-rabbitmq, batch=17.1_20250721.1, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1760169090', 'TRIPLEO_CONFIG_HASH': '9c4e4bc0cbf263e81bcbe5493649df08'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-rabbitmq/images/17.1.9-1, distribution-scope=public, version=17.1.9, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, architecture=x86_64, container_name=rabbitmq_bootstrap, io.buildah.version=1.33.12, io.openshift.tags=rhosp osp openstack osp-17.1, io.openshift.expose-services=, managed_by=tripleo_ansible, config_id=tripleo_step1, com.redhat.license_terms=https://www.redhat.com/agreements, vendor=Red Hat, Inc., com.redhat.component=openstack-rabbitmq-container, release=1) Oct 11 09:10:39 np0005481012 podman[71857]: 2025-10-11 09:10:39.043508798 +0000 UTC m=+0.195567270 container init a120521e907fc0a2544999394b6e33e7cf8397637e52d3e98fe9a7d12eb626ca (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=redis_tls_proxy, batch=17.1_20250721.1, vcs-ref=ff6161246d28f7887060a5133e281d72aa432576, com.redhat.component=openstack-redis-container, distribution-scope=public, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-redis/images/17.1.9-1, config_id=tripleo_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, summary=Red Hat OpenStack Platform 17.1 redis, maintainer=OpenStack TripleO Team, container_name=redis_tls_proxy, architecture=x86_64, version=17.1.9, io.buildah.version=1.33.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, name=rhosp17/openstack-redis, description=Red Hat OpenStack Platform 17.1 redis, release=1, io.openshift.tags=rhosp osp openstack osp-17.1, vendor=Red Hat, Inc., io.openshift.expose-services=, vcs-type=git, build-date=2025-07-21T13:10:13, managed_by=tripleo_ansible, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ef8c949a885ec409d680ee6ff31e91e1'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}, com.redhat.license_terms=https://www.redhat.com/agreements) Oct 11 09:10:39 np0005481012 python3[71686]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name rabbitmq_bootstrap --conmon-pidfile /run/rabbitmq_bootstrap.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_DEPLOY_IDENTIFIER=1760169090 --env TRIPLEO_CONFIG_HASH=9c4e4bc0cbf263e81bcbe5493649df08 --label config_id=tripleo_step1 --label container_name=rabbitmq_bootstrap --label managed_by=tripleo_ansible --label config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1760169090', 'TRIPLEO_CONFIG_HASH': '9c4e4bc0cbf263e81bcbe5493649df08'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/rabbitmq_bootstrap.log --network host --privileged=False --user root --volume /var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /var/lib/rabbitmq:/var/lib/rabbitmq:z --volume /etc/puppet:/etc/puppet:ro,z registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 bash -ec kolla_set_configs#012if [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi#012hiera 'rabbitmq::erlang_cookie' > /var/lib/rabbitmq/.erlang.cookie#012chown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie#012chmod 400 /var/lib/rabbitmq/.erlang.cookie Oct 11 09:10:39 np0005481012 podman[71857]: 2025-10-11 09:10:39.051801565 +0000 UTC m=+0.203860027 container start a120521e907fc0a2544999394b6e33e7cf8397637e52d3e98fe9a7d12eb626ca (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=redis_tls_proxy, com.redhat.component=openstack-redis-container, managed_by=tripleo_ansible, distribution-scope=public, build-date=2025-07-21T13:10:13, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ef8c949a885ec409d680ee6ff31e91e1'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/agreements, summary=Red Hat OpenStack Platform 17.1 redis, release=1, container_name=redis_tls_proxy, config_id=tripleo_step1, vendor=Red Hat, Inc., batch=17.1_20250721.1, vcs-ref=ff6161246d28f7887060a5133e281d72aa432576, io.openshift.expose-services=, version=17.1.9, io.openshift.tags=rhosp osp openstack osp-17.1, tcib_managed=true, io.buildah.version=1.33.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, vcs-type=git, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-redis/images/17.1.9-1, description=Red Hat OpenStack Platform 17.1 redis, name=rhosp17/openstack-redis) Oct 11 09:10:39 np0005481012 python3[71686]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name redis_tls_proxy --conmon-pidfile /run/redis_tls_proxy.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=ef8c949a885ec409d680ee6ff31e91e1 --label config_id=tripleo_step1 --label container_name=redis_tls_proxy --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'ef8c949a885ec409d680ee6ff31e91e1'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/redis_tls_proxy.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro --volume /etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro --volume /var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Oct 11 09:10:39 np0005481012 systemd[1]: Started /usr/bin/podman healthcheck run ca1cf214058ce5187b0cd87d3add8e2f591695f8e7b5ed13c0e6c237c6cf9d65. Oct 11 09:10:39 np0005481012 podman[71874]: 2025-10-11 09:10:39.074565089 +0000 UTC m=+0.212251267 container init ca1cf214058ce5187b0cd87d3add8e2f591695f8e7b5ed13c0e6c237c6cf9d65 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, description=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, batch=17.1_20250721.1, container_name=memcached, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-memcached/images/17.1.9-1, version=17.1.9, vcs-type=git, build-date=2025-07-21T12:58:43, release=1, name=rhosp17/openstack-memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=c5579e43aadfadb0a3c02e9b1c0ac35d1b75fcbe, summary=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/agreements, io.buildah.version=1.33.12, com.redhat.component=openstack-memcached-container, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7cabf7af6dffa9451de7685929b15d94'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.openshift.expose-services=, config_id=tripleo_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1, managed_by=tripleo_ansible, distribution-scope=public) Oct 11 09:10:39 np0005481012 systemd[1]: Started /usr/bin/podman healthcheck run ca1cf214058ce5187b0cd87d3add8e2f591695f8e7b5ed13c0e6c237c6cf9d65. Oct 11 09:10:39 np0005481012 podman[71851]: 2025-10-11 09:10:39.120729406 +0000 UTC m=+0.272669125 container start 85c6d98562b73f40e6b53a4b9c310e764f8745ad7d3d738226bc39232f4a047b (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20250721.1, name=rhosp17/openstack-qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/agreements, release=1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-ref=4a9cf7084a7631a8cf28014f76f8f9d6da5b1fed, vcs-type=git, tcib_managed=true, architecture=x86_64, container_name=metrics_qdr_init_logs, build-date=2025-07-21T13:07:59, distribution-scope=public, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-qdrouterd/images/17.1.9-1, vendor=Red Hat, Inc., io.buildah.version=1.33.12, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, version=17.1.9, config_id=tripleo_step1, io.openshift.expose-services=, com.redhat.component=openstack-qdrouterd-container, io.openshift.tags=rhosp osp openstack osp-17.1) Oct 11 09:10:39 np0005481012 podman[71851]: 2025-10-11 09:10:39.121257633 +0000 UTC m=+0.273197402 container attach 85c6d98562b73f40e6b53a4b9c310e764f8745ad7d3d738226bc39232f4a047b (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, io.openshift.tags=rhosp osp openstack osp-17.1, release=1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/agreements, distribution-scope=public, maintainer=OpenStack TripleO Team, batch=17.1_20250721.1, version=17.1.9, io.openshift.expose-services=, architecture=x86_64, container_name=metrics_qdr_init_logs, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-qdrouterd/images/17.1.9-1, managed_by=tripleo_ansible, vendor=Red Hat, Inc., config_id=tripleo_step1, vcs-ref=4a9cf7084a7631a8cf28014f76f8f9d6da5b1fed, build-date=2025-07-21T13:07:59, vcs-type=git, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp17/openstack-qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, io.buildah.version=1.33.12, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}) Oct 11 09:10:39 np0005481012 podman[71851]: 2025-10-11 09:10:39.123969957 +0000 UTC m=+0.275909666 container died 85c6d98562b73f40e6b53a4b9c310e764f8745ad7d3d738226bc39232f4a047b (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, io.openshift.tags=rhosp osp openstack osp-17.1, name=rhosp17/openstack-qdrouterd, managed_by=tripleo_ansible, vendor=Red Hat, Inc., build-date=2025-07-21T13:07:59, distribution-scope=public, io.buildah.version=1.33.12, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-qdrouterd/images/17.1.9-1, architecture=x86_64, release=1, maintainer=OpenStack TripleO Team, vcs-type=git, tcib_managed=true, config_id=tripleo_step1, com.redhat.license_terms=https://www.redhat.com/agreements, summary=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, batch=17.1_20250721.1, version=17.1.9, com.redhat.component=openstack-qdrouterd-container, vcs-ref=4a9cf7084a7631a8cf28014f76f8f9d6da5b1fed, description=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=metrics_qdr_init_logs, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd) Oct 11 09:10:39 np0005481012 podman[71954]: 2025-10-11 09:10:39.136146063 +0000 UTC m=+0.114060409 container cleanup 8f3e3daa0e5814e7d8989deac7c3820661e9bfe619c2a99a836c67ecaca1a228 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, batch=17.1_20250721.1, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, build-date=2025-07-21T12:58:45, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-mariadb, version=17.1.9, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, container_name=mysql_data_ownership, io.buildah.version=1.33.12, vcs-type=git, managed_by=tripleo_ansible, config_id=tripleo_step1, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/agreements, release=1, description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, io.openshift.tags=rhosp osp openstack osp-17.1, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, io.openshift.expose-services=) Oct 11 09:10:39 np0005481012 systemd[1]: libpod-conmon-8f3e3daa0e5814e7d8989deac7c3820661e9bfe619c2a99a836c67ecaca1a228.scope: Deactivated successfully. Oct 11 09:10:39 np0005481012 systemd[1]: libpod-4dd97b06eca64eba837edb2dcdfa316fe7d2a53737aaf3768dcb504fe2e0fb0f.scope: Deactivated successfully. Oct 11 09:10:39 np0005481012 python3[71686]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name mysql_data_ownership --conmon-pidfile /run/mysql_data_ownership.pid --detach=False --label config_id=tripleo_step1 --label container_name=mysql_data_ownership --label managed_by=tripleo_ansible --label config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/mysql_data_ownership.log --network host --user root --volume /var/lib/mysql:/var/lib/mysql:z registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 chown -R mysql: /var/lib/mysql Oct 11 09:10:39 np0005481012 podman[71874]: 2025-10-11 09:10:39.204019522 +0000 UTC m=+0.341705700 container start ca1cf214058ce5187b0cd87d3add8e2f591695f8e7b5ed13c0e6c237c6cf9d65 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, name=rhosp17/openstack-memcached, tcib_managed=true, version=17.1.9, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/agreements, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7cabf7af6dffa9451de7685929b15d94'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1, container_name=memcached, architecture=x86_64, maintainer=OpenStack TripleO Team, batch=17.1_20250721.1, vendor=Red Hat, Inc., release=1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-memcached/images/17.1.9-1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=c5579e43aadfadb0a3c02e9b1c0ac35d1b75fcbe, build-date=2025-07-21T12:58:43, description=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_step1, io.openshift.expose-services=, io.buildah.version=1.33.12, com.redhat.component=openstack-memcached-container, distribution-scope=public, managed_by=tripleo_ansible) Oct 11 09:10:39 np0005481012 python3[71686]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name memcached --conmon-pidfile /run/memcached.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=7cabf7af6dffa9451de7685929b15d94 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step1 --label container_name=memcached --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7cabf7af6dffa9451de7685929b15d94'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/memcached.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z --volume /var/log/containers/memcached:/var/log/memcached:rw --volume /etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro --volume /etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Oct 11 09:10:39 np0005481012 podman[71996]: 2025-10-11 09:10:39.229366926 +0000 UTC m=+0.123868992 container health_status ca1cf214058ce5187b0cd87d3add8e2f591695f8e7b5ed13c0e6c237c6cf9d65 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=starting, com.redhat.component=openstack-memcached-container, maintainer=OpenStack TripleO Team, architecture=x86_64, io.buildah.version=1.33.12, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 memcached, version=17.1.9, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, distribution-scope=public, managed_by=tripleo_ansible, vcs-ref=c5579e43aadfadb0a3c02e9b1c0ac35d1b75fcbe, io.openshift.tags=rhosp osp openstack osp-17.1, name=rhosp17/openstack-memcached, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7cabf7af6dffa9451de7685929b15d94'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, batch=17.1_20250721.1, container_name=memcached, vendor=Red Hat, Inc., build-date=2025-07-21T12:58:43, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-memcached/images/17.1.9-1, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, release=1, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-type=git) Oct 11 09:10:39 np0005481012 podman[71931]: 2025-10-11 09:10:39.252497432 +0000 UTC m=+0.266540966 container cleanup 85c6d98562b73f40e6b53a4b9c310e764f8745ad7d3d738226bc39232f4a047b (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, tcib_managed=true, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-qdrouterd/images/17.1.9-1, managed_by=tripleo_ansible, build-date=2025-07-21T13:07:59, maintainer=OpenStack TripleO Team, vcs-type=git, container_name=metrics_qdr_init_logs, config_id=tripleo_step1, io.openshift.tags=rhosp osp openstack osp-17.1, name=rhosp17/openstack-qdrouterd, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.33.12, release=1, description=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, com.redhat.component=openstack-qdrouterd-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20250721.1, com.redhat.license_terms=https://www.redhat.com/agreements, vcs-ref=4a9cf7084a7631a8cf28014f76f8f9d6da5b1fed, version=17.1.9, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}) Oct 11 09:10:39 np0005481012 systemd[1]: libpod-conmon-85c6d98562b73f40e6b53a4b9c310e764f8745ad7d3d738226bc39232f4a047b.scope: Deactivated successfully. Oct 11 09:10:39 np0005481012 python3[71686]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name metrics_qdr_init_logs --conmon-pidfile /run/metrics_qdr_init_logs.pid --detach=False --label config_id=tripleo_step1 --label container_name=metrics_qdr_init_logs --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/metrics_qdr_init_logs.log --network none --privileged=False --user root --volume /var/log/containers/metrics_qdr:/var/log/qdrouterd:z registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 /bin/bash -c chown -R qdrouterd:qdrouterd /var/log/qdrouterd Oct 11 09:10:39 np0005481012 podman[71996]: 2025-10-11 09:10:39.27633849 +0000 UTC m=+0.170840546 container exec_died ca1cf214058ce5187b0cd87d3add8e2f591695f8e7b5ed13c0e6c237c6cf9d65 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, io.buildah.version=1.33.12, config_id=tripleo_step1, io.openshift.tags=rhosp osp openstack osp-17.1, tcib_managed=true, batch=17.1_20250721.1, distribution-scope=public, io.openshift.expose-services=, vendor=Red Hat, Inc., name=rhosp17/openstack-memcached, vcs-type=git, com.redhat.component=openstack-memcached-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7cabf7af6dffa9451de7685929b15d94'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, com.redhat.license_terms=https://www.redhat.com/agreements, version=17.1.9, maintainer=OpenStack TripleO Team, build-date=2025-07-21T12:58:43, vcs-ref=c5579e43aadfadb0a3c02e9b1c0ac35d1b75fcbe, description=Red Hat OpenStack Platform 17.1 memcached, release=1, container_name=memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-memcached/images/17.1.9-1, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 memcached) Oct 11 09:10:39 np0005481012 systemd[1]: ca1cf214058ce5187b0cd87d3add8e2f591695f8e7b5ed13c0e6c237c6cf9d65.service: Deactivated successfully. Oct 11 09:10:39 np0005481012 podman[72052]: 2025-10-11 09:10:39.354537388 +0000 UTC m=+0.144316355 container died 4dd97b06eca64eba837edb2dcdfa316fe7d2a53737aaf3768dcb504fe2e0fb0f (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, distribution-scope=public, version=17.1.9, architecture=x86_64, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-rabbitmq/images/17.1.9-1, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 rabbitmq, release=1, summary=Red Hat OpenStack Platform 17.1 rabbitmq, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1760169090', 'TRIPLEO_CONFIG_HASH': '9c4e4bc0cbf263e81bcbe5493649df08'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.component=openstack-rabbitmq-container, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1, name=rhosp17/openstack-rabbitmq, io.buildah.version=1.33.12, batch=17.1_20250721.1, com.redhat.license_terms=https://www.redhat.com/agreements, config_id=tripleo_step1, tcib_managed=true, build-date=2025-07-21T13:08:05, vcs-ref=b30dae4cd2f9a99467af45e3d985bc71318ed98b, container_name=rabbitmq_bootstrap, io.openshift.expose-services=) Oct 11 09:10:39 np0005481012 podman[72052]: 2025-10-11 09:10:39.374547467 +0000 UTC m=+0.164326364 container cleanup 4dd97b06eca64eba837edb2dcdfa316fe7d2a53737aaf3768dcb504fe2e0fb0f (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, io.openshift.tags=rhosp osp openstack osp-17.1, name=rhosp17/openstack-rabbitmq, io.buildah.version=1.33.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-ref=b30dae4cd2f9a99467af45e3d985bc71318ed98b, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, managed_by=tripleo_ansible, vcs-type=git, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/agreements, container_name=rabbitmq_bootstrap, release=1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-rabbitmq/images/17.1.9-1, version=17.1.9, io.openshift.expose-services=, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1760169090', 'TRIPLEO_CONFIG_HASH': '9c4e4bc0cbf263e81bcbe5493649df08'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, maintainer=OpenStack TripleO Team, tcib_managed=true, vendor=Red Hat, Inc., build-date=2025-07-21T13:08:05, description=Red Hat OpenStack Platform 17.1 rabbitmq, architecture=x86_64, batch=17.1_20250721.1, config_id=tripleo_step1, com.redhat.component=openstack-rabbitmq-container) Oct 11 09:10:39 np0005481012 systemd[1]: libpod-conmon-4dd97b06eca64eba837edb2dcdfa316fe7d2a53737aaf3768dcb504fe2e0fb0f.scope: Deactivated successfully. Oct 11 09:10:39 np0005481012 podman[72226]: 2025-10-11 09:10:39.809970625 +0000 UTC m=+0.107310390 container create 11212b31f494f77a26406dc9908ebb2d0efa92b4f1a01b7e9bc6c71c85cc93a1 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, version=17.1.9, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, vendor=Red Hat, Inc., io.openshift.expose-services=, io.buildah.version=1.33.12, com.redhat.license_terms=https://www.redhat.com/agreements, name=rhosp17/openstack-mariadb, com.redhat.component=openstack-mariadb-container, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'os0Agkj03LOntIGpXqXNEwPpL', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd790aa0f75198179a1842be7c5662142'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, summary=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, tcib_managed=true, batch=17.1_20250721.1, container_name=mysql_bootstrap, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, release=1, vcs-type=git, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, build-date=2025-07-21T12:58:45, config_id=tripleo_step1, maintainer=OpenStack TripleO Team) Oct 11 09:10:39 np0005481012 podman[72227]: 2025-10-11 09:10:39.813546436 +0000 UTC m=+0.108172467 container create b24a479feedfe8aadd1edee54fa69f3a754fc564c338cd74117faef78f00f621 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, maintainer=OpenStack TripleO Team, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-qdrouterd/images/17.1.9-1, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/agreements, summary=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '90584b63f74acd2af6785b0ea458a356'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, release=1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., container_name=metrics_qdr, io.openshift.expose-services=, com.redhat.component=openstack-qdrouterd-container, io.openshift.tags=rhosp osp openstack osp-17.1, distribution-scope=public, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, build-date=2025-07-21T13:07:59, description=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.9, config_id=tripleo_step1, batch=17.1_20250721.1, vcs-ref=4a9cf7084a7631a8cf28014f76f8f9d6da5b1fed, tcib_managed=true, io.buildah.version=1.33.12, name=rhosp17/openstack-qdrouterd) Oct 11 09:10:39 np0005481012 podman[72227]: 2025-10-11 09:10:39.747273856 +0000 UTC m=+0.041899917 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Oct 11 09:10:39 np0005481012 podman[72226]: 2025-10-11 09:10:39.749906027 +0000 UTC m=+0.047245852 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Oct 11 09:10:39 np0005481012 systemd[1]: Started libpod-conmon-b24a479feedfe8aadd1edee54fa69f3a754fc564c338cd74117faef78f00f621.scope. Oct 11 09:10:39 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:39 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/b7d6d6235f33685a4642778f6b50e1a22dc971e4b2629049f3ea73161aac4786/merged/var/log/qdrouterd supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:39 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/b7d6d6235f33685a4642778f6b50e1a22dc971e4b2629049f3ea73161aac4786/merged/var/lib/qdrouterd supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:39 np0005481012 systemd[1]: Started libpod-conmon-11212b31f494f77a26406dc9908ebb2d0efa92b4f1a01b7e9bc6c71c85cc93a1.scope. Oct 11 09:10:39 np0005481012 systemd[1]: Started libcrun container. Oct 11 09:10:39 np0005481012 systemd[1]: Started /usr/bin/podman healthcheck run b24a479feedfe8aadd1edee54fa69f3a754fc564c338cd74117faef78f00f621. Oct 11 09:10:39 np0005481012 podman[72227]: 2025-10-11 09:10:39.927943665 +0000 UTC m=+0.222569756 container init b24a479feedfe8aadd1edee54fa69f3a754fc564c338cd74117faef78f00f621 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1, batch=17.1_20250721.1, maintainer=OpenStack TripleO Team, tcib_managed=true, architecture=x86_64, container_name=metrics_qdr, io.openshift.expose-services=, name=rhosp17/openstack-qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '90584b63f74acd2af6785b0ea458a356'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vcs-ref=4a9cf7084a7631a8cf28014f76f8f9d6da5b1fed, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-qdrouterd/images/17.1.9-1, managed_by=tripleo_ansible, version=17.1.9, config_id=tripleo_step1, com.redhat.license_terms=https://www.redhat.com/agreements, summary=Red Hat OpenStack Platform 17.1 qdrouterd, release=1, vendor=Red Hat, Inc., vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.33.12, build-date=2025-07-21T13:07:59, distribution-scope=public) Oct 11 09:10:39 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/3f733aac0dd0df8a3d42993a2692bd5a587e8160b293be57f573978bf9b18aab/merged/var/lib/mysql supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:39 np0005481012 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/3f733aac0dd0df8a3d42993a2692bd5a587e8160b293be57f573978bf9b18aab/merged/var/lib/kolla/config_files/config.json supports timestamps until 2038 (0x7fffffff) Oct 11 09:10:39 np0005481012 podman[72226]: 2025-10-11 09:10:39.9384675 +0000 UTC m=+0.235807285 container init 11212b31f494f77a26406dc9908ebb2d0efa92b4f1a01b7e9bc6c71c85cc93a1 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, io.openshift.tags=rhosp osp openstack osp-17.1, tcib_managed=true, managed_by=tripleo_ansible, vendor=Red Hat, Inc., io.buildah.version=1.33.12, config_id=tripleo_step1, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'os0Agkj03LOntIGpXqXNEwPpL', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd790aa0f75198179a1842be7c5662142'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, distribution-scope=public, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, vcs-type=git, container_name=mysql_bootstrap, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-mariadb, build-date=2025-07-21T12:58:45, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, batch=17.1_20250721.1, version=17.1.9, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, release=1, com.redhat.license_terms=https://www.redhat.com/agreements, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb) Oct 11 09:10:39 np0005481012 systemd[1]: Started /usr/bin/podman healthcheck run b24a479feedfe8aadd1edee54fa69f3a754fc564c338cd74117faef78f00f621. Oct 11 09:10:39 np0005481012 podman[72226]: 2025-10-11 09:10:39.96980556 +0000 UTC m=+0.267145325 container start 11212b31f494f77a26406dc9908ebb2d0efa92b4f1a01b7e9bc6c71c85cc93a1 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, io.buildah.version=1.33.12, io.openshift.tags=rhosp osp openstack osp-17.1, version=17.1.9, release=1, managed_by=tripleo_ansible, name=rhosp17/openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, config_id=tripleo_step1, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/agreements, maintainer=OpenStack TripleO Team, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'os0Agkj03LOntIGpXqXNEwPpL', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd790aa0f75198179a1842be7c5662142'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, tcib_managed=true, vcs-type=git, build-date=2025-07-21T12:58:45, architecture=x86_64, com.redhat.component=openstack-mariadb-container, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., container_name=mysql_bootstrap, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, batch=17.1_20250721.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb) Oct 11 09:10:39 np0005481012 podman[72226]: 2025-10-11 09:10:39.970737798 +0000 UTC m=+0.268077593 container attach 11212b31f494f77a26406dc9908ebb2d0efa92b4f1a01b7e9bc6c71c85cc93a1 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, version=17.1.9, com.redhat.component=openstack-mariadb-container, build-date=2025-07-21T12:58:45, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/agreements, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'os0Agkj03LOntIGpXqXNEwPpL', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd790aa0f75198179a1842be7c5662142'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, summary=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, batch=17.1_20250721.1, release=1, container_name=mysql_bootstrap, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step1, name=rhosp17/openstack-mariadb, io.openshift.tags=rhosp osp openstack osp-17.1, tcib_managed=true, vcs-type=git, io.buildah.version=1.33.12, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1) Oct 11 09:10:40 np0005481012 podman[72227]: 2025-10-11 09:10:40.022811188 +0000 UTC m=+0.317437259 container start b24a479feedfe8aadd1edee54fa69f3a754fc564c338cd74117faef78f00f621 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, vcs-ref=4a9cf7084a7631a8cf28014f76f8f9d6da5b1fed, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-qdrouterd/images/17.1.9-1, description=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20250721.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '90584b63f74acd2af6785b0ea458a356'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, release=1, config_id=tripleo_step1, io.openshift.tags=rhosp osp openstack osp-17.1, distribution-scope=public, vcs-type=git, name=rhosp17/openstack-qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, io.buildah.version=1.33.12, build-date=2025-07-21T13:07:59, com.redhat.license_terms=https://www.redhat.com/agreements, managed_by=tripleo_ansible, version=17.1.9, io.openshift.expose-services=, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, container_name=metrics_qdr, summary=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container) Oct 11 09:10:40 np0005481012 python3[71686]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name metrics_qdr --conmon-pidfile /run/metrics_qdr.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=90584b63f74acd2af6785b0ea458a356 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step1 --label container_name=metrics_qdr --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '90584b63f74acd2af6785b0ea458a356'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/metrics_qdr.log --network host --privileged=False --user qdrouterd --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro --volume /var/lib/metrics_qdr:/var/lib/qdrouterd:z --volume /var/log/containers/metrics_qdr:/var/log/qdrouterd:z --volume /etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro --volume /etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Oct 11 09:10:40 np0005481012 podman[72267]: 2025-10-11 09:10:40.068800321 +0000 UTC m=+0.087999653 container health_status b24a479feedfe8aadd1edee54fa69f3a754fc564c338cd74117faef78f00f621 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=starting, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/agreements, io.buildah.version=1.33.12, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '90584b63f74acd2af6785b0ea458a356'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vcs-ref=4a9cf7084a7631a8cf28014f76f8f9d6da5b1fed, io.openshift.tags=rhosp osp openstack osp-17.1, version=17.1.9, distribution-scope=public, release=1, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., config_id=tripleo_step1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, com.redhat.component=openstack-qdrouterd-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-qdrouterd/images/17.1.9-1, name=rhosp17/openstack-qdrouterd, container_name=metrics_qdr, vcs-type=git, batch=17.1_20250721.1, build-date=2025-07-21T13:07:59) Oct 11 09:10:40 np0005481012 podman[72267]: 2025-10-11 09:10:40.295827653 +0000 UTC m=+0.315026976 container exec_died b24a479feedfe8aadd1edee54fa69f3a754fc564c338cd74117faef78f00f621 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, vcs-ref=4a9cf7084a7631a8cf28014f76f8f9d6da5b1fed, summary=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, name=rhosp17/openstack-qdrouterd, release=1, tcib_managed=true, com.redhat.component=openstack-qdrouterd-container, vcs-type=git, io.openshift.expose-services=, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1, batch=17.1_20250721.1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-qdrouterd/images/17.1.9-1, version=17.1.9, container_name=metrics_qdr, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., build-date=2025-07-21T13:07:59, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/agreements, io.buildah.version=1.33.12, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '90584b63f74acd2af6785b0ea458a356'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}) Oct 11 09:10:40 np0005481012 systemd[1]: b24a479feedfe8aadd1edee54fa69f3a754fc564c338cd74117faef78f00f621.service: Deactivated successfully. Oct 11 09:10:45 np0005481012 systemd[1]: libpod-11212b31f494f77a26406dc9908ebb2d0efa92b4f1a01b7e9bc6c71c85cc93a1.scope: Deactivated successfully. Oct 11 09:10:45 np0005481012 systemd[1]: libpod-11212b31f494f77a26406dc9908ebb2d0efa92b4f1a01b7e9bc6c71c85cc93a1.scope: Consumed 2.483s CPU time. Oct 11 09:10:45 np0005481012 podman[73054]: 2025-10-11 09:10:45.977526134 +0000 UTC m=+0.058403428 container died 11212b31f494f77a26406dc9908ebb2d0efa92b4f1a01b7e9bc6c71c85cc93a1 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, vcs-type=git, config_id=tripleo_step1, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, container_name=mysql_bootstrap, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/agreements, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'os0Agkj03LOntIGpXqXNEwPpL', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd790aa0f75198179a1842be7c5662142'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, com.redhat.component=openstack-mariadb-container, release=1, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, build-date=2025-07-21T12:58:45, managed_by=tripleo_ansible, name=rhosp17/openstack-mariadb, tcib_managed=true, version=17.1.9, io.buildah.version=1.33.12, io.openshift.tags=rhosp osp openstack osp-17.1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, batch=17.1_20250721.1) Oct 11 09:10:46 np0005481012 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-11212b31f494f77a26406dc9908ebb2d0efa92b4f1a01b7e9bc6c71c85cc93a1-userdata-shm.mount: Deactivated successfully. Oct 11 09:10:46 np0005481012 systemd[1]: var-lib-containers-storage-overlay-3f733aac0dd0df8a3d42993a2692bd5a587e8160b293be57f573978bf9b18aab-merged.mount: Deactivated successfully. Oct 11 09:10:46 np0005481012 podman[73054]: 2025-10-11 09:10:46.022282018 +0000 UTC m=+0.103159262 container cleanup 11212b31f494f77a26406dc9908ebb2d0efa92b4f1a01b7e9bc6c71c85cc93a1 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, maintainer=OpenStack TripleO Team, release=1, com.redhat.license_terms=https://www.redhat.com/agreements, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'os0Agkj03LOntIGpXqXNEwPpL', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd790aa0f75198179a1842be7c5662142'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.33.12, container_name=mysql_bootstrap, summary=Red Hat OpenStack Platform 17.1 mariadb, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-mariadb/images/17.1.9-1, architecture=x86_64, distribution-scope=public, vcs-type=git, build-date=2025-07-21T12:58:45, vendor=Red Hat, Inc., name=rhosp17/openstack-mariadb, vcs-ref=da2cb5ba4cc0b38a4a0c84aa2adf09772ed77172, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20250721.1, io.openshift.expose-services=, config_id=tripleo_step1, com.redhat.component=openstack-mariadb-container, io.openshift.tags=rhosp osp openstack osp-17.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, version=17.1.9) Oct 11 09:10:46 np0005481012 systemd[1]: libpod-conmon-11212b31f494f77a26406dc9908ebb2d0efa92b4f1a01b7e9bc6c71c85cc93a1.scope: Deactivated successfully. Oct 11 09:10:46 np0005481012 python3[71686]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name mysql_bootstrap --conmon-pidfile /run/mysql_bootstrap.pid --detach=False --env DB_MARIABACKUP_PASSWORD=os0Agkj03LOntIGpXqXNEwPpL --env DB_MARIABACKUP_USER=mariabackup --env DB_MAX_TIMEOUT=60 --env KOLLA_BOOTSTRAP=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=d790aa0f75198179a1842be7c5662142 --label config_id=tripleo_step1 --label container_name=mysql_bootstrap --label managed_by=tripleo_ansible --label config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'os0Agkj03LOntIGpXqXNEwPpL', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'd790aa0f75198179a1842be7c5662142'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/mysql_bootstrap.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z --volume /var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z --volume /var/lib/mysql:/var/lib/mysql:rw,z --volume /etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro --volume /etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 bash -ec if [ -e /var/lib/mysql/mysql ]; then exit 0; fi#012echo -e "\n[mysqld]\nwsrep_provider=none" >> /etc/my.cnf#012export DB_ROOT_PASSWORD=$(hiera 'mysql::server::root_password')#012kolla_set_configs#012sudo -u mysql -E kolla_extend_start#012timeout ${DB_MAX_TIMEOUT} /bin/bash -c 'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done'#012mysqld_safe --skip-networking --wsrep-on=OFF timeout ${DB_MAX_TIMEOUT} /bin/bash -c 'until mysqladmin -uroot -p"$(hiera 'mysql::server::root_password')" ping 2>/dev/null; do sleep 1; done'#012mysql -uroot -p"$(hiera 'mysql::server::root_password')" -e "CREATE USER 'clustercheck'@'localhost' IDENTIFIED BY '$(hiera mysql_clustercheck_password)';"#012mysql -uroot -p"$(hiera 'mysql::server::root_password')" -e "GRANT PROCESS ON *.* TO 'clustercheck'@'localhost' WITH GRANT OPTION;"#012mysql -uroot -p"$(hiera 'mysql::server::root_password')" -e "DELETE FROM mysql.user WHERE user = 'root' AND host NOT IN ('%','localhost');"#012timeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera 'mysql::server::root_password')" shutdown Oct 11 09:10:46 np0005481012 python3[73107]: ansible-file Invoked with path=/etc/systemd/system/tripleo_memcached.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 09:10:46 np0005481012 python3[73123]: ansible-file Invoked with path=/etc/systemd/system/tripleo_metrics_qdr.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 09:10:47 np0005481012 python3[73139]: ansible-file Invoked with path=/etc/systemd/system/tripleo_redis_tls_proxy.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 09:10:47 np0005481012 python3[73155]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_memcached_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 09:10:47 np0005481012 python3[73171]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_metrics_qdr_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 09:10:48 np0005481012 python3[73187]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_redis_tls_proxy_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 09:10:48 np0005481012 python3[73248]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760173848.1144211-177122-193843996081257/source dest=/etc/systemd/system/tripleo_memcached.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 09:10:49 np0005481012 python3[73277]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760173848.1144211-177122-193843996081257/source dest=/etc/systemd/system/tripleo_metrics_qdr.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 09:10:49 np0005481012 python3[73306]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760173848.1144211-177122-193843996081257/source dest=/etc/systemd/system/tripleo_redis_tls_proxy.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 09:10:50 np0005481012 python3[73322]: ansible-systemd Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Oct 11 09:10:50 np0005481012 systemd[1]: Reloading. Oct 11 09:10:50 np0005481012 systemd-rc-local-generator[73340]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 09:10:50 np0005481012 systemd-sysv-generator[73348]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 09:10:50 np0005481012 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 09:10:51 np0005481012 python3[73374]: ansible-systemd Invoked with state=restarted name=tripleo_memcached.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 09:10:52 np0005481012 systemd[1]: Reloading. Oct 11 09:10:52 np0005481012 systemd-sysv-generator[73404]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 09:10:52 np0005481012 systemd-rc-local-generator[73401]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 09:10:52 np0005481012 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 09:10:52 np0005481012 systemd[1]: Starting memcached container... Oct 11 09:10:52 np0005481012 systemd[1]: Started memcached container. Oct 11 09:10:53 np0005481012 python3[73442]: ansible-systemd Invoked with state=restarted name=tripleo_metrics_qdr.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 09:10:53 np0005481012 systemd[1]: Reloading. Oct 11 09:10:53 np0005481012 systemd-sysv-generator[73474]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 09:10:53 np0005481012 systemd-rc-local-generator[73469]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 09:10:53 np0005481012 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 09:10:53 np0005481012 systemd[1]: Starting metrics_qdr container... Oct 11 09:10:53 np0005481012 systemd[1]: Started metrics_qdr container. Oct 11 09:10:54 np0005481012 python3[73509]: ansible-systemd Invoked with state=restarted name=tripleo_redis_tls_proxy.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 09:10:54 np0005481012 systemd[1]: Reloading. Oct 11 09:10:54 np0005481012 systemd-sysv-generator[73541]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 09:10:54 np0005481012 systemd-rc-local-generator[73534]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 09:10:54 np0005481012 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 09:10:54 np0005481012 systemd[1]: Starting redis_tls_proxy container... Oct 11 09:10:54 np0005481012 systemd[1]: Started redis_tls_proxy container. Oct 11 09:10:55 np0005481012 python3[73590]: ansible-file Invoked with path=/var/lib/container-puppet/container-puppet-tasks1.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 09:10:56 np0005481012 python3[73711]: ansible-container_puppet_config Invoked with check_mode=False config_vol_prefix=/var/lib/config-data debug=True net_host=True no_archive=True puppet_config=/var/lib/container-puppet/container-puppet-tasks1.json short_hostname=np0005481012 step=1 update_config_hash_only=False Oct 11 09:10:57 np0005481012 python3[73727]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 09:10:57 np0005481012 python3[73743]: ansible-container_config_data Invoked with config_path=/var/lib/tripleo-config/container-puppet-config/step_1 config_pattern=container-puppet-*.json config_overrides={} debug=True Oct 11 09:11:09 np0005481012 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:2b:a5:c8 MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.145 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=3925 DF PROTO=TCP SPT=38182 DPT=19885 SEQ=2115408879 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080A29A3D1410000000001030307) Oct 11 09:11:09 np0005481012 systemd[1]: Started /usr/bin/podman healthcheck run ca1cf214058ce5187b0cd87d3add8e2f591695f8e7b5ed13c0e6c237c6cf9d65. Oct 11 09:11:09 np0005481012 sshd[73755]: main: sshd: ssh-rsa algorithm is disabled Oct 11 09:11:09 np0005481012 podman[73744]: 2025-10-11 09:11:09.482613281 +0000 UTC m=+0.073575378 container health_status ca1cf214058ce5187b0cd87d3add8e2f591695f8e7b5ed13c0e6c237c6cf9d65 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, io.buildah.version=1.33.12, config_id=tripleo_step1, tcib_managed=true, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/agreements, batch=17.1_20250721.1, build-date=2025-07-21T12:58:43, container_name=memcached, version=17.1.9, vendor=Red Hat, Inc., config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7cabf7af6dffa9451de7685929b15d94'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, release=1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-memcached/images/17.1.9-1, com.redhat.component=openstack-memcached-container, distribution-scope=public, name=rhosp17/openstack-memcached, vcs-ref=c5579e43aadfadb0a3c02e9b1c0ac35d1b75fcbe, description=Red Hat OpenStack Platform 17.1 memcached, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached) Oct 11 09:11:09 np0005481012 podman[73744]: 2025-10-11 09:11:09.525874968 +0000 UTC m=+0.116837035 container exec_died ca1cf214058ce5187b0cd87d3add8e2f591695f8e7b5ed13c0e6c237c6cf9d65 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7cabf7af6dffa9451de7685929b15d94'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20250721.1, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 memcached, build-date=2025-07-21T12:58:43, io.buildah.version=1.33.12, version=17.1.9, com.redhat.component=openstack-memcached-container, config_id=tripleo_step1, architecture=x86_64, container_name=memcached, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/agreements, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, name=rhosp17/openstack-memcached, release=1, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-memcached/images/17.1.9-1, vcs-ref=c5579e43aadfadb0a3c02e9b1c0ac35d1b75fcbe, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1) Oct 11 09:11:09 np0005481012 systemd[1]: ca1cf214058ce5187b0cd87d3add8e2f591695f8e7b5ed13c0e6c237c6cf9d65.service: Deactivated successfully. Oct 11 09:11:09 np0005481012 systemd[1]: Starting User Manager for UID 1000... Oct 11 09:11:09 np0005481012 systemd-logind[36317]: New session 17 of user zuul. Oct 11 09:11:09 np0005481012 systemd[73770]: Queued start job for default target Main User Target. Oct 11 09:11:09 np0005481012 systemd[73770]: Created slice User Application Slice. Oct 11 09:11:09 np0005481012 systemd[73770]: Started Mark boot as successful after the user session has run 2 minutes. Oct 11 09:11:09 np0005481012 systemd[73770]: Started Daily Cleanup of User's Temporary Directories. Oct 11 09:11:09 np0005481012 systemd[73770]: Reached target Paths. Oct 11 09:11:09 np0005481012 systemd[73770]: Reached target Timers. Oct 11 09:11:09 np0005481012 systemd[73770]: Starting D-Bus User Message Bus Socket... Oct 11 09:11:09 np0005481012 systemd[73770]: Starting Create User's Volatile Files and Directories... Oct 11 09:11:09 np0005481012 systemd[73770]: Listening on D-Bus User Message Bus Socket. Oct 11 09:11:09 np0005481012 systemd[73770]: Reached target Sockets. Oct 11 09:11:09 np0005481012 systemd[73770]: Finished Create User's Volatile Files and Directories. Oct 11 09:11:09 np0005481012 systemd[73770]: Reached target Basic System. Oct 11 09:11:09 np0005481012 systemd[73770]: Reached target Main User Target. Oct 11 09:11:09 np0005481012 systemd[73770]: Startup finished in 115ms. Oct 11 09:11:09 np0005481012 systemd[1]: Started User Manager for UID 1000. Oct 11 09:11:09 np0005481012 systemd[1]: Started Session 17 of User zuul. Oct 11 09:11:10 np0005481012 python3[73800]: ansible-ansible.legacy.command Invoked with _raw_params=subscription-manager unregister#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-bd38-0707-00000000000c-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 09:11:10 np0005481012 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:2b:a5:c8 MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.145 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=3926 DF PROTO=TCP SPT=38182 DPT=19885 SEQ=2115408879 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080A29A3D52B0000000001030307) Oct 11 09:11:10 np0005481012 systemd[1]: Started /usr/bin/podman healthcheck run b24a479feedfe8aadd1edee54fa69f3a754fc564c338cd74117faef78f00f621. Oct 11 09:11:10 np0005481012 podman[73803]: 2025-10-11 09:11:10.491039842 +0000 UTC m=+0.077728985 container health_status b24a479feedfe8aadd1edee54fa69f3a754fc564c338cd74117faef78f00f621 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, vcs-ref=4a9cf7084a7631a8cf28014f76f8f9d6da5b1fed, build-date=2025-07-21T13:07:59, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, batch=17.1_20250721.1, tcib_managed=true, name=rhosp17/openstack-qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '90584b63f74acd2af6785b0ea458a356'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-qdrouterd/images/17.1.9-1, com.redhat.license_terms=https://www.redhat.com/agreements, io.openshift.tags=rhosp osp openstack osp-17.1, managed_by=tripleo_ansible, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, release=1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., container_name=metrics_qdr, com.redhat.component=openstack-qdrouterd-container, io.buildah.version=1.33.12, version=17.1.9, vcs-type=git) Oct 11 09:11:10 np0005481012 subscription-manager[73801]: Unregistered machine with identity: cbac40ed-0070-46ec-8187-10d3a1f7078f Oct 11 09:11:10 np0005481012 podman[73803]: 2025-10-11 09:11:10.693817674 +0000 UTC m=+0.280506837 container exec_died b24a479feedfe8aadd1edee54fa69f3a754fc564c338cd74117faef78f00f621 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, config_id=tripleo_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://access.redhat.com/containers/#/registry.access.redhat.com/rhosp17/openstack-qdrouterd/images/17.1.9-1, managed_by=tripleo_ansible, build-date=2025-07-21T13:07:59, io.buildah.version=1.33.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, version=17.1.9, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '90584b63f74acd2af6785b0ea458a356'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1, com.redhat.component=openstack-qdrouterd-container, description=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, io.openshift.expose-services=, vcs-ref=4a9cf7084a7631a8cf28014f76f8f9d6da5b1fed, summary=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp17/openstack-qdrouterd, container_name=metrics_qdr, com.redhat.license_terms=https://www.redhat.com/agreements, architecture=x86_64, batch=17.1_20250721.1, release=1, vcs-type=git, vendor=Red Hat, Inc.) Oct 11 09:11:10 np0005481012 systemd[1]: b24a479feedfe8aadd1edee54fa69f3a754fc564c338cd74117faef78f00f621.service: Deactivated successfully. Oct 11 09:11:12 np0005481012 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:2b:a5:c8 MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.145 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=3927 DF PROTO=TCP SPT=38182 DPT=19885 SEQ=2115408879 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080A29A3DD2B0000000001030307) Oct 11 09:11:15 np0005481012 systemd[1]: session-17.scope: Deactivated successfully. Oct 11 09:11:15 np0005481012 systemd-logind[36317]: Session 17 logged out. Waiting for processes to exit. Oct 11 09:11:15 np0005481012 systemd-logind[36317]: Removed session 17. Oct 11 09:11:26 np0005481012 systemd[1]: Stopping User Manager for UID 1000... Oct 11 09:11:26 np0005481012 systemd[73770]: Activating special unit Exit the Session... Oct 11 09:11:26 np0005481012 systemd[73770]: Stopped target Main User Target. Oct 11 09:11:26 np0005481012 systemd[73770]: Stopped target Basic System. Oct 11 09:11:26 np0005481012 systemd[73770]: Stopped target Paths. Oct 11 09:11:26 np0005481012 systemd[73770]: Stopped target Sockets. Oct 11 09:11:26 np0005481012 systemd[73770]: Stopped target Timers. Oct 11 09:11:26 np0005481012 systemd[73770]: Stopped Mark boot as successful after the user session has run 2 minutes. Oct 11 09:11:26 np0005481012 systemd[73770]: Stopped Daily Cleanup of User's Temporary Directories. Oct 11 09:11:26 np0005481012 systemd[73770]: Closed D-Bus User Message Bus Socket. Oct 11 09:11:26 np0005481012 systemd[73770]: Stopped Create User's Volatile Files and Directories. Oct 11 09:11:26 np0005481012 systemd[73770]: Removed slice User Application Slice. Oct 11 09:11:26 np0005481012 systemd[73770]: Reached target Shutdown. Oct 11 09:11:26 np0005481012 systemd[73770]: Finished Exit the Session. Oct 11 09:11:26 np0005481012 systemd[73770]: Reached target Exit the Session. Oct 11 09:11:26 np0005481012 systemd[1]: user@1000.service: Deactivated successfully. Oct 11 09:11:26 np0005481012 systemd[1]: Stopped User Manager for UID 1000. Oct 11 09:11:26 np0005481012 sshd[73832]: main: sshd: ssh-rsa algorithm is disabled Oct 11 09:11:26 np0005481012 systemd[1]: Starting User Manager for UID 1000... Oct 11 09:11:26 np0005481012 systemd-logind[36317]: New session 19 of user zuul. Oct 11 09:11:26 np0005481012 systemd[73836]: Queued start job for default target Main User Target. Oct 11 09:11:26 np0005481012 systemd[73836]: Created slice User Application Slice. Oct 11 09:11:26 np0005481012 systemd[73836]: Started Mark boot as successful after the user session has run 2 minutes. Oct 11 09:11:26 np0005481012 systemd[73836]: Started Daily Cleanup of User's Temporary Directories. Oct 11 09:11:26 np0005481012 systemd[73836]: Reached target Paths. Oct 11 09:11:26 np0005481012 systemd[73836]: Reached target Timers. Oct 11 09:11:26 np0005481012 systemd[73836]: Starting D-Bus User Message Bus Socket... Oct 11 09:11:26 np0005481012 systemd[73836]: Starting Create User's Volatile Files and Directories... Oct 11 09:11:26 np0005481012 systemd[73836]: Finished Create User's Volatile Files and Directories. Oct 11 09:11:26 np0005481012 systemd[73836]: Listening on D-Bus User Message Bus Socket. Oct 11 09:11:26 np0005481012 systemd[73836]: Reached target Sockets. Oct 11 09:11:26 np0005481012 systemd[73836]: Reached target Basic System. Oct 11 09:11:26 np0005481012 systemd[73836]: Reached target Main User Target. Oct 11 09:11:26 np0005481012 systemd[73836]: Startup finished in 151ms. Oct 11 09:11:26 np0005481012 systemd[1]: Started User Manager for UID 1000. Oct 11 09:11:26 np0005481012 systemd[1]: Started Session 19 of User zuul.