Oct 11 02:44:44 localhost kernel: Linux version 5.14.0-284.11.1.el9_2.x86_64 (mockbuild@x86-vm-09.build.eng.bos.redhat.com) (gcc (GCC) 11.3.1 20221121 (Red Hat 11.3.1-4), GNU ld version 2.35.2-37.el9) #1 SMP PREEMPT_DYNAMIC Wed Apr 12 10:45:03 EDT 2023 Oct 11 02:44:44 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Oct 11 02:44:44 localhost kernel: Command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Oct 11 02:44:44 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 11 02:44:44 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 11 02:44:44 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 11 02:44:44 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 11 02:44:44 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Oct 11 02:44:44 localhost kernel: signal: max sigframe size: 1776 Oct 11 02:44:44 localhost kernel: BIOS-provided physical RAM map: Oct 11 02:44:44 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 11 02:44:44 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 11 02:44:44 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 11 02:44:44 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Oct 11 02:44:44 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Oct 11 02:44:44 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Oct 11 02:44:44 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 11 02:44:44 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000043fffffff] usable Oct 11 02:44:44 localhost kernel: NX (Execute Disable) protection: active Oct 11 02:44:44 localhost kernel: SMBIOS 2.8 present. Oct 11 02:44:44 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Oct 11 02:44:44 localhost kernel: Hypervisor detected: KVM Oct 11 02:44:44 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 11 02:44:44 localhost kernel: kvm-clock: using sched offset of 2839733762 cycles Oct 11 02:44:44 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 11 02:44:44 localhost kernel: tsc: Detected 2799.998 MHz processor Oct 11 02:44:44 localhost kernel: last_pfn = 0x440000 max_arch_pfn = 0x400000000 Oct 11 02:44:44 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 11 02:44:44 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Oct 11 02:44:44 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Oct 11 02:44:44 localhost kernel: Using GB pages for direct mapping Oct 11 02:44:44 localhost kernel: RAMDISK: [mem 0x2eef4000-0x33771fff] Oct 11 02:44:44 localhost kernel: ACPI: Early table checksum verification disabled Oct 11 02:44:44 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Oct 11 02:44:44 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 11 02:44:44 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 11 02:44:44 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 11 02:44:44 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Oct 11 02:44:44 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 11 02:44:44 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 11 02:44:44 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Oct 11 02:44:44 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Oct 11 02:44:44 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Oct 11 02:44:44 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Oct 11 02:44:44 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Oct 11 02:44:44 localhost kernel: No NUMA configuration found Oct 11 02:44:44 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000043fffffff] Oct 11 02:44:44 localhost kernel: NODE_DATA(0) allocated [mem 0x43ffd5000-0x43fffffff] Oct 11 02:44:44 localhost kernel: Reserving 256MB of memory at 2800MB for crashkernel (System RAM: 16383MB) Oct 11 02:44:44 localhost kernel: Zone ranges: Oct 11 02:44:44 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 11 02:44:44 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Oct 11 02:44:44 localhost kernel: Normal [mem 0x0000000100000000-0x000000043fffffff] Oct 11 02:44:44 localhost kernel: Device empty Oct 11 02:44:44 localhost kernel: Movable zone start for each node Oct 11 02:44:44 localhost kernel: Early memory node ranges Oct 11 02:44:44 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 11 02:44:44 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Oct 11 02:44:44 localhost kernel: node 0: [mem 0x0000000100000000-0x000000043fffffff] Oct 11 02:44:44 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000043fffffff] Oct 11 02:44:44 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 11 02:44:44 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 11 02:44:44 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Oct 11 02:44:44 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Oct 11 02:44:44 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 11 02:44:44 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 11 02:44:44 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 11 02:44:44 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 11 02:44:44 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 11 02:44:44 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 11 02:44:44 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 11 02:44:44 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 11 02:44:44 localhost kernel: TSC deadline timer available Oct 11 02:44:44 localhost kernel: smpboot: Allowing 8 CPUs, 0 hotplug CPUs Oct 11 02:44:44 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Oct 11 02:44:44 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Oct 11 02:44:44 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Oct 11 02:44:44 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Oct 11 02:44:44 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Oct 11 02:44:44 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Oct 11 02:44:44 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Oct 11 02:44:44 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Oct 11 02:44:44 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Oct 11 02:44:44 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Oct 11 02:44:44 localhost kernel: Booting paravirtualized kernel on KVM Oct 11 02:44:44 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 11 02:44:44 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Oct 11 02:44:44 localhost kernel: percpu: Embedded 55 pages/cpu s188416 r8192 d28672 u262144 Oct 11 02:44:44 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Oct 11 02:44:44 localhost kernel: Fallback order for Node 0: 0 Oct 11 02:44:44 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 4128475 Oct 11 02:44:44 localhost kernel: Policy zone: Normal Oct 11 02:44:44 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Oct 11 02:44:44 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64", will be passed to user space. Oct 11 02:44:44 localhost kernel: Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Oct 11 02:44:44 localhost kernel: Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Oct 11 02:44:44 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 11 02:44:44 localhost kernel: software IO TLB: area num 8. Oct 11 02:44:44 localhost kernel: Memory: 2873456K/16776676K available (14342K kernel code, 5536K rwdata, 10180K rodata, 2792K init, 7524K bss, 741260K reserved, 0K cma-reserved) Oct 11 02:44:44 localhost kernel: random: get_random_u64 called from kmem_cache_open+0x1e/0x210 with crng_init=0 Oct 11 02:44:44 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Oct 11 02:44:44 localhost kernel: ftrace: allocating 44803 entries in 176 pages Oct 11 02:44:44 localhost kernel: ftrace: allocated 176 pages with 3 groups Oct 11 02:44:44 localhost kernel: Dynamic Preempt: voluntary Oct 11 02:44:44 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Oct 11 02:44:44 localhost kernel: rcu: #011RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Oct 11 02:44:44 localhost kernel: #011Trampoline variant of Tasks RCU enabled. Oct 11 02:44:44 localhost kernel: #011Rude variant of Tasks RCU enabled. Oct 11 02:44:44 localhost kernel: #011Tracing variant of Tasks RCU enabled. Oct 11 02:44:44 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 11 02:44:44 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Oct 11 02:44:44 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Oct 11 02:44:44 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Oct 11 02:44:44 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Oct 11 02:44:44 localhost kernel: random: crng init done (trusting CPU's manufacturer) Oct 11 02:44:44 localhost kernel: Console: colour VGA+ 80x25 Oct 11 02:44:44 localhost kernel: printk: console [tty0] enabled Oct 11 02:44:44 localhost kernel: printk: console [ttyS0] enabled Oct 11 02:44:44 localhost kernel: ACPI: Core revision 20211217 Oct 11 02:44:44 localhost kernel: APIC: Switch to symmetric I/O mode setup Oct 11 02:44:44 localhost kernel: x2apic enabled Oct 11 02:44:44 localhost kernel: Switched APIC routing to physical x2apic. Oct 11 02:44:44 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Oct 11 02:44:44 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Oct 11 02:44:44 localhost kernel: pid_max: default: 32768 minimum: 301 Oct 11 02:44:44 localhost kernel: LSM: Security Framework initializing Oct 11 02:44:44 localhost kernel: Yama: becoming mindful. Oct 11 02:44:44 localhost kernel: SELinux: Initializing. Oct 11 02:44:44 localhost kernel: LSM support for eBPF active Oct 11 02:44:44 localhost kernel: Mount-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 11 02:44:44 localhost kernel: Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 11 02:44:44 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Oct 11 02:44:44 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Oct 11 02:44:44 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Oct 11 02:44:44 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 11 02:44:44 localhost kernel: Spectre V2 : Mitigation: Retpolines Oct 11 02:44:44 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 11 02:44:44 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 11 02:44:44 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Oct 11 02:44:44 localhost kernel: RETBleed: Mitigation: untrained return thunk Oct 11 02:44:44 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 11 02:44:44 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Oct 11 02:44:44 localhost kernel: Freeing SMP alternatives memory: 36K Oct 11 02:44:44 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Oct 11 02:44:44 localhost kernel: cblist_init_generic: Setting adjustable number of callback queues. Oct 11 02:44:44 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Oct 11 02:44:44 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Oct 11 02:44:44 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Oct 11 02:44:44 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Oct 11 02:44:44 localhost kernel: ... version: 0 Oct 11 02:44:44 localhost kernel: ... bit width: 48 Oct 11 02:44:44 localhost kernel: ... generic registers: 6 Oct 11 02:44:44 localhost kernel: ... value mask: 0000ffffffffffff Oct 11 02:44:44 localhost kernel: ... max period: 00007fffffffffff Oct 11 02:44:44 localhost kernel: ... fixed-purpose events: 0 Oct 11 02:44:44 localhost kernel: ... event mask: 000000000000003f Oct 11 02:44:44 localhost kernel: rcu: Hierarchical SRCU implementation. Oct 11 02:44:44 localhost kernel: rcu: #011Max phase no-delay instances is 400. Oct 11 02:44:44 localhost kernel: smp: Bringing up secondary CPUs ... Oct 11 02:44:44 localhost kernel: x86: Booting SMP configuration: Oct 11 02:44:44 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Oct 11 02:44:44 localhost kernel: smp: Brought up 1 node, 8 CPUs Oct 11 02:44:44 localhost kernel: smpboot: Max logical packages: 8 Oct 11 02:44:44 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Oct 11 02:44:44 localhost kernel: node 0 deferred pages initialised in 26ms Oct 11 02:44:44 localhost kernel: devtmpfs: initialized Oct 11 02:44:44 localhost kernel: x86/mm: Memory block size: 128MB Oct 11 02:44:44 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 11 02:44:44 localhost kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Oct 11 02:44:44 localhost kernel: pinctrl core: initialized pinctrl subsystem Oct 11 02:44:44 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 11 02:44:44 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL pool for atomic allocations Oct 11 02:44:44 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Oct 11 02:44:44 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Oct 11 02:44:44 localhost kernel: audit: initializing netlink subsys (disabled) Oct 11 02:44:44 localhost kernel: audit: type=2000 audit(1760165082.856:1): state=initialized audit_enabled=0 res=1 Oct 11 02:44:44 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Oct 11 02:44:44 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 11 02:44:44 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Oct 11 02:44:44 localhost kernel: cpuidle: using governor menu Oct 11 02:44:44 localhost kernel: HugeTLB: can optimize 4095 vmemmap pages for hugepages-1048576kB Oct 11 02:44:44 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 11 02:44:44 localhost kernel: PCI: Using configuration type 1 for base access Oct 11 02:44:44 localhost kernel: PCI: Using configuration type 1 for extended access Oct 11 02:44:44 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 11 02:44:44 localhost kernel: HugeTLB: can optimize 7 vmemmap pages for hugepages-2048kB Oct 11 02:44:44 localhost kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 11 02:44:44 localhost kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 11 02:44:44 localhost kernel: cryptd: max_cpu_qlen set to 1000 Oct 11 02:44:44 localhost kernel: ACPI: Added _OSI(Module Device) Oct 11 02:44:44 localhost kernel: ACPI: Added _OSI(Processor Device) Oct 11 02:44:44 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 11 02:44:44 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 11 02:44:44 localhost kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 11 02:44:44 localhost kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 11 02:44:44 localhost kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 11 02:44:44 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 11 02:44:44 localhost kernel: ACPI: Interpreter enabled Oct 11 02:44:44 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Oct 11 02:44:44 localhost kernel: ACPI: Using IOAPIC for interrupt routing Oct 11 02:44:44 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 11 02:44:44 localhost kernel: PCI: Using E820 reservations for host bridge windows Oct 11 02:44:44 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Oct 11 02:44:44 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 11 02:44:44 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Oct 11 02:44:44 localhost kernel: acpiphp: Slot [3] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [4] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [5] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [6] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [7] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [8] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [9] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [10] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [11] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [12] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [13] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [14] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [15] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [16] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [17] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [18] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [19] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [20] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [21] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [22] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [23] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [24] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [25] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [26] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [27] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [28] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [29] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [30] registered Oct 11 02:44:44 localhost kernel: acpiphp: Slot [31] registered Oct 11 02:44:44 localhost kernel: PCI host bridge to bus 0000:00 Oct 11 02:44:44 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 11 02:44:44 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 11 02:44:44 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 11 02:44:44 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 11 02:44:44 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x440000000-0x4bfffffff window] Oct 11 02:44:44 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 11 02:44:44 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Oct 11 02:44:44 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Oct 11 02:44:44 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Oct 11 02:44:44 localhost kernel: pci 0000:00:01.1: reg 0x20: [io 0xc140-0xc14f] Oct 11 02:44:44 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Oct 11 02:44:44 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Oct 11 02:44:44 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Oct 11 02:44:44 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Oct 11 02:44:44 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Oct 11 02:44:44 localhost kernel: pci 0000:00:01.2: reg 0x20: [io 0xc100-0xc11f] Oct 11 02:44:44 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Oct 11 02:44:44 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Oct 11 02:44:44 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Oct 11 02:44:44 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Oct 11 02:44:44 localhost kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Oct 11 02:44:44 localhost kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Oct 11 02:44:44 localhost kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Oct 11 02:44:44 localhost kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Oct 11 02:44:44 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 11 02:44:44 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Oct 11 02:44:44 localhost kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Oct 11 02:44:44 localhost kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Oct 11 02:44:44 localhost kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Oct 11 02:44:44 localhost kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Oct 11 02:44:44 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Oct 11 02:44:44 localhost kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Oct 11 02:44:44 localhost kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Oct 11 02:44:44 localhost kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Oct 11 02:44:44 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Oct 11 02:44:44 localhost kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Oct 11 02:44:44 localhost kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Oct 11 02:44:44 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Oct 11 02:44:44 localhost kernel: pci 0000:00:06.0: reg 0x10: [io 0xc120-0xc13f] Oct 11 02:44:44 localhost kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Oct 11 02:44:44 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 11 02:44:44 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 11 02:44:44 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 11 02:44:44 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 11 02:44:44 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 11 02:44:44 localhost kernel: iommu: Default domain type: Translated Oct 11 02:44:44 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 11 02:44:44 localhost kernel: SCSI subsystem initialized Oct 11 02:44:44 localhost kernel: ACPI: bus type USB registered Oct 11 02:44:44 localhost kernel: usbcore: registered new interface driver usbfs Oct 11 02:44:44 localhost kernel: usbcore: registered new interface driver hub Oct 11 02:44:44 localhost kernel: usbcore: registered new device driver usb Oct 11 02:44:44 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Oct 11 02:44:44 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 11 02:44:44 localhost kernel: PTP clock support registered Oct 11 02:44:44 localhost kernel: EDAC MC: Ver: 3.0.0 Oct 11 02:44:44 localhost kernel: NetLabel: Initializing Oct 11 02:44:44 localhost kernel: NetLabel: domain hash size = 128 Oct 11 02:44:44 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Oct 11 02:44:44 localhost kernel: NetLabel: unlabeled traffic allowed by default Oct 11 02:44:44 localhost kernel: PCI: Using ACPI for IRQ routing Oct 11 02:44:44 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Oct 11 02:44:44 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Oct 11 02:44:44 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 11 02:44:44 localhost kernel: vgaarb: loaded Oct 11 02:44:44 localhost kernel: clocksource: Switched to clocksource kvm-clock Oct 11 02:44:44 localhost kernel: VFS: Disk quotas dquot_6.6.0 Oct 11 02:44:44 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 11 02:44:44 localhost kernel: pnp: PnP ACPI init Oct 11 02:44:44 localhost kernel: pnp: PnP ACPI: found 5 devices Oct 11 02:44:44 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 11 02:44:44 localhost kernel: NET: Registered PF_INET protocol family Oct 11 02:44:44 localhost kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 11 02:44:44 localhost kernel: tcp_listen_portaddr_hash hash table entries: 8192 (order: 5, 131072 bytes, linear) Oct 11 02:44:44 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 11 02:44:44 localhost kernel: TCP established hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 11 02:44:44 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Oct 11 02:44:44 localhost kernel: TCP: Hash tables configured (established 131072 bind 65536) Oct 11 02:44:44 localhost kernel: MPTCP token hash table entries: 16384 (order: 6, 393216 bytes, linear) Oct 11 02:44:44 localhost kernel: UDP hash table entries: 8192 (order: 6, 262144 bytes, linear) Oct 11 02:44:44 localhost kernel: UDP-Lite hash table entries: 8192 (order: 6, 262144 bytes, linear) Oct 11 02:44:44 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 11 02:44:44 localhost kernel: NET: Registered PF_XDP protocol family Oct 11 02:44:44 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 11 02:44:44 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 11 02:44:44 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 11 02:44:44 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Oct 11 02:44:44 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x440000000-0x4bfffffff window] Oct 11 02:44:44 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Oct 11 02:44:44 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 11 02:44:44 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Oct 11 02:44:44 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x140 took 27016 usecs Oct 11 02:44:44 localhost kernel: PCI: CLS 0 bytes, default 64 Oct 11 02:44:44 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 11 02:44:44 localhost kernel: Trying to unpack rootfs image as initramfs... Oct 11 02:44:44 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Oct 11 02:44:44 localhost kernel: ACPI: bus type thunderbolt registered Oct 11 02:44:44 localhost kernel: Initialise system trusted keyrings Oct 11 02:44:44 localhost kernel: Key type blacklist registered Oct 11 02:44:44 localhost kernel: workingset: timestamp_bits=36 max_order=22 bucket_order=0 Oct 11 02:44:44 localhost kernel: zbud: loaded Oct 11 02:44:44 localhost kernel: integrity: Platform Keyring initialized Oct 11 02:44:44 localhost kernel: NET: Registered PF_ALG protocol family Oct 11 02:44:44 localhost kernel: xor: automatically using best checksumming function avx Oct 11 02:44:44 localhost kernel: Key type asymmetric registered Oct 11 02:44:44 localhost kernel: Asymmetric key parser 'x509' registered Oct 11 02:44:44 localhost kernel: Running certificate verification selftests Oct 11 02:44:44 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Oct 11 02:44:44 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Oct 11 02:44:44 localhost kernel: io scheduler mq-deadline registered Oct 11 02:44:44 localhost kernel: io scheduler kyber registered Oct 11 02:44:44 localhost kernel: io scheduler bfq registered Oct 11 02:44:44 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Oct 11 02:44:44 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Oct 11 02:44:44 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Oct 11 02:44:44 localhost kernel: ACPI: button: Power Button [PWRF] Oct 11 02:44:44 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Oct 11 02:44:44 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Oct 11 02:44:44 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Oct 11 02:44:44 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 11 02:44:44 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 11 02:44:44 localhost kernel: Non-volatile memory driver v1.3 Oct 11 02:44:44 localhost kernel: rdac: device handler registered Oct 11 02:44:44 localhost kernel: hp_sw: device handler registered Oct 11 02:44:44 localhost kernel: emc: device handler registered Oct 11 02:44:44 localhost kernel: alua: device handler registered Oct 11 02:44:44 localhost kernel: libphy: Fixed MDIO Bus: probed Oct 11 02:44:44 localhost kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Oct 11 02:44:44 localhost kernel: ehci-pci: EHCI PCI platform driver Oct 11 02:44:44 localhost kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver Oct 11 02:44:44 localhost kernel: ohci-pci: OHCI PCI platform driver Oct 11 02:44:44 localhost kernel: uhci_hcd: USB Universal Host Controller Interface driver Oct 11 02:44:44 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Oct 11 02:44:44 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Oct 11 02:44:44 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Oct 11 02:44:44 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Oct 11 02:44:44 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Oct 11 02:44:44 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Oct 11 02:44:44 localhost kernel: usb usb1: Product: UHCI Host Controller Oct 11 02:44:44 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-284.11.1.el9_2.x86_64 uhci_hcd Oct 11 02:44:44 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Oct 11 02:44:44 localhost kernel: hub 1-0:1.0: USB hub found Oct 11 02:44:44 localhost kernel: hub 1-0:1.0: 2 ports detected Oct 11 02:44:44 localhost kernel: usbcore: registered new interface driver usbserial_generic Oct 11 02:44:44 localhost kernel: usbserial: USB Serial support registered for generic Oct 11 02:44:44 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 11 02:44:44 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 11 02:44:44 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 11 02:44:44 localhost kernel: mousedev: PS/2 mouse device common for all mice Oct 11 02:44:44 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Oct 11 02:44:44 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Oct 11 02:44:44 localhost kernel: rtc_cmos 00:04: registered as rtc0 Oct 11 02:44:44 localhost kernel: rtc_cmos 00:04: setting system clock to 2025-10-11T06:44:43 UTC (1760165083) Oct 11 02:44:44 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Oct 11 02:44:44 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Oct 11 02:44:44 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Oct 11 02:44:44 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Oct 11 02:44:44 localhost kernel: usbcore: registered new interface driver usbhid Oct 11 02:44:44 localhost kernel: usbhid: USB HID core driver Oct 11 02:44:44 localhost kernel: drop_monitor: Initializing network drop monitor service Oct 11 02:44:44 localhost kernel: Initializing XFRM netlink socket Oct 11 02:44:44 localhost kernel: NET: Registered PF_INET6 protocol family Oct 11 02:44:44 localhost kernel: Segment Routing with IPv6 Oct 11 02:44:44 localhost kernel: NET: Registered PF_PACKET protocol family Oct 11 02:44:44 localhost kernel: mpls_gso: MPLS GSO support Oct 11 02:44:44 localhost kernel: IPI shorthand broadcast: enabled Oct 11 02:44:44 localhost kernel: AVX2 version of gcm_enc/dec engaged. Oct 11 02:44:44 localhost kernel: AES CTR mode by8 optimization enabled Oct 11 02:44:44 localhost kernel: sched_clock: Marking stable (765851355, 187702367)->(1087483918, -133930196) Oct 11 02:44:44 localhost kernel: registered taskstats version 1 Oct 11 02:44:44 localhost kernel: Loading compiled-in X.509 certificates Oct 11 02:44:44 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Oct 11 02:44:44 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Oct 11 02:44:44 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Oct 11 02:44:44 localhost kernel: zswap: loaded using pool lzo/zbud Oct 11 02:44:44 localhost kernel: page_owner is disabled Oct 11 02:44:44 localhost kernel: Key type big_key registered Oct 11 02:44:44 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Oct 11 02:44:44 localhost kernel: Freeing initrd memory: 74232K Oct 11 02:44:44 localhost kernel: Key type encrypted registered Oct 11 02:44:44 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Oct 11 02:44:44 localhost kernel: Loading compiled-in module X.509 certificates Oct 11 02:44:44 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Oct 11 02:44:44 localhost kernel: ima: Allocated hash algorithm: sha256 Oct 11 02:44:44 localhost kernel: ima: No architecture policies found Oct 11 02:44:44 localhost kernel: evm: Initialising EVM extended attributes: Oct 11 02:44:44 localhost kernel: evm: security.selinux Oct 11 02:44:44 localhost kernel: evm: security.SMACK64 (disabled) Oct 11 02:44:44 localhost kernel: evm: security.SMACK64EXEC (disabled) Oct 11 02:44:44 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Oct 11 02:44:44 localhost kernel: evm: security.SMACK64MMAP (disabled) Oct 11 02:44:44 localhost kernel: evm: security.apparmor (disabled) Oct 11 02:44:44 localhost kernel: evm: security.ima Oct 11 02:44:44 localhost kernel: evm: security.capability Oct 11 02:44:44 localhost kernel: evm: HMAC attrs: 0x1 Oct 11 02:44:44 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Oct 11 02:44:44 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Oct 11 02:44:44 localhost kernel: usb 1-1: Product: QEMU USB Tablet Oct 11 02:44:44 localhost kernel: usb 1-1: Manufacturer: QEMU Oct 11 02:44:44 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Oct 11 02:44:44 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Oct 11 02:44:44 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Oct 11 02:44:44 localhost kernel: Freeing unused decrypted memory: 2036K Oct 11 02:44:44 localhost kernel: Freeing unused kernel image (initmem) memory: 2792K Oct 11 02:44:44 localhost kernel: Write protecting the kernel read-only data: 26624k Oct 11 02:44:44 localhost kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 11 02:44:44 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 60K Oct 11 02:44:44 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Oct 11 02:44:44 localhost kernel: Run /init as init process Oct 11 02:44:44 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 11 02:44:44 localhost systemd[1]: Detected virtualization kvm. Oct 11 02:44:44 localhost systemd[1]: Detected architecture x86-64. Oct 11 02:44:44 localhost systemd[1]: Running in initrd. Oct 11 02:44:44 localhost systemd[1]: No hostname configured, using default hostname. Oct 11 02:44:44 localhost systemd[1]: Hostname set to . Oct 11 02:44:44 localhost systemd[1]: Initializing machine ID from VM UUID. Oct 11 02:44:44 localhost systemd[1]: Queued start job for default target Initrd Default Target. Oct 11 02:44:44 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Oct 11 02:44:44 localhost systemd[1]: Reached target Local Encrypted Volumes. Oct 11 02:44:44 localhost systemd[1]: Reached target Initrd /usr File System. Oct 11 02:44:44 localhost systemd[1]: Reached target Local File Systems. Oct 11 02:44:44 localhost systemd[1]: Reached target Path Units. Oct 11 02:44:44 localhost systemd[1]: Reached target Slice Units. Oct 11 02:44:44 localhost systemd[1]: Reached target Swaps. Oct 11 02:44:44 localhost systemd[1]: Reached target Timer Units. Oct 11 02:44:44 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Oct 11 02:44:44 localhost systemd[1]: Listening on Journal Socket (/dev/log). Oct 11 02:44:44 localhost systemd[1]: Listening on Journal Socket. Oct 11 02:44:44 localhost systemd[1]: Listening on udev Control Socket. Oct 11 02:44:44 localhost systemd[1]: Listening on udev Kernel Socket. Oct 11 02:44:44 localhost systemd[1]: Reached target Socket Units. Oct 11 02:44:44 localhost systemd[1]: Starting Create List of Static Device Nodes... Oct 11 02:44:44 localhost systemd[1]: Starting Journal Service... Oct 11 02:44:44 localhost systemd[1]: Starting Load Kernel Modules... Oct 11 02:44:44 localhost systemd[1]: Starting Create System Users... Oct 11 02:44:44 localhost systemd[1]: Starting Setup Virtual Console... Oct 11 02:44:44 localhost systemd[1]: Finished Create List of Static Device Nodes. Oct 11 02:44:44 localhost systemd[1]: Finished Load Kernel Modules. Oct 11 02:44:44 localhost systemd[1]: Starting Apply Kernel Variables... Oct 11 02:44:44 localhost systemd-journald[284]: Journal started Oct 11 02:44:44 localhost systemd-journald[284]: Runtime Journal (/run/log/journal/550f5e0dab3848f0806a7661c8361ea0) is 8.0M, max 314.7M, 306.7M free. Oct 11 02:44:44 localhost systemd-modules-load[285]: Module 'msr' is built in Oct 11 02:44:44 localhost systemd[1]: Started Journal Service. Oct 11 02:44:44 localhost systemd-sysusers[286]: Creating group 'sgx' with GID 997. Oct 11 02:44:44 localhost systemd[1]: Finished Apply Kernel Variables. Oct 11 02:44:44 localhost systemd[1]: Finished Setup Virtual Console. Oct 11 02:44:44 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Oct 11 02:44:44 localhost systemd[1]: Starting dracut cmdline hook... Oct 11 02:44:44 localhost systemd-sysusers[286]: Creating group 'users' with GID 100. Oct 11 02:44:44 localhost systemd-sysusers[286]: Creating group 'dbus' with GID 81. Oct 11 02:44:44 localhost systemd-sysusers[286]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Oct 11 02:44:44 localhost systemd[1]: Finished Create System Users. Oct 11 02:44:44 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Oct 11 02:44:44 localhost systemd[1]: Starting Create Volatile Files and Directories... Oct 11 02:44:44 localhost dracut-cmdline[291]: dracut-9.2 (Plow) dracut-057-21.git20230214.el9 Oct 11 02:44:44 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Oct 11 02:44:44 localhost dracut-cmdline[291]: Using kernel command line parameters: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Oct 11 02:44:44 localhost systemd[1]: Finished Create Volatile Files and Directories. Oct 11 02:44:44 localhost systemd[1]: Finished dracut cmdline hook. Oct 11 02:44:44 localhost systemd[1]: Starting dracut pre-udev hook... Oct 11 02:44:44 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 11 02:44:44 localhost kernel: device-mapper: uevent: version 1.0.3 Oct 11 02:44:44 localhost kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Oct 11 02:44:44 localhost kernel: RPC: Registered named UNIX socket transport module. Oct 11 02:44:44 localhost kernel: RPC: Registered udp transport module. Oct 11 02:44:44 localhost kernel: RPC: Registered tcp transport module. Oct 11 02:44:44 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Oct 11 02:44:44 localhost rpc.statd[407]: Version 2.5.4 starting Oct 11 02:44:44 localhost rpc.statd[407]: Initializing NSM state Oct 11 02:44:44 localhost rpc.idmapd[412]: Setting log level to 0 Oct 11 02:44:44 localhost systemd[1]: Finished dracut pre-udev hook. Oct 11 02:44:44 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Oct 11 02:44:44 localhost systemd-udevd[425]: Using default interface naming scheme 'rhel-9.0'. Oct 11 02:44:44 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Oct 11 02:44:44 localhost systemd[1]: Starting dracut pre-trigger hook... Oct 11 02:44:44 localhost systemd[1]: Finished dracut pre-trigger hook. Oct 11 02:44:44 localhost systemd[1]: Starting Coldplug All udev Devices... Oct 11 02:44:44 localhost systemd[1]: Finished Coldplug All udev Devices. Oct 11 02:44:44 localhost systemd[1]: Reached target System Initialization. Oct 11 02:44:44 localhost systemd[1]: Reached target Basic System. Oct 11 02:44:44 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Oct 11 02:44:44 localhost systemd[1]: Reached target Network. Oct 11 02:44:44 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Oct 11 02:44:44 localhost systemd[1]: Starting dracut initqueue hook... Oct 11 02:44:44 localhost systemd-udevd[440]: Network interface NamePolicy= disabled on kernel command line. Oct 11 02:44:44 localhost kernel: scsi host0: ata_piix Oct 11 02:44:44 localhost kernel: scsi host1: ata_piix Oct 11 02:44:44 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 Oct 11 02:44:44 localhost kernel: virtio_blk virtio2: [vda] 838860800 512-byte logical blocks (429 GB/400 GiB) Oct 11 02:44:44 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 Oct 11 02:44:44 localhost kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 11 02:44:44 localhost kernel: GPT:20971519 != 838860799 Oct 11 02:44:44 localhost kernel: GPT:Alternate GPT header not at the end of the disk. Oct 11 02:44:44 localhost kernel: GPT:20971519 != 838860799 Oct 11 02:44:44 localhost kernel: GPT: Use GNU Parted to correct GPT errors. Oct 11 02:44:44 localhost kernel: vda: vda1 vda2 vda3 vda4 Oct 11 02:44:45 localhost systemd[1]: Found device /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Oct 11 02:44:45 localhost systemd[1]: Reached target Initrd Root Device. Oct 11 02:44:45 localhost kernel: ata1: found unknown device (class 0) Oct 11 02:44:45 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Oct 11 02:44:45 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Oct 11 02:44:45 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Oct 11 02:44:45 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Oct 11 02:44:45 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 11 02:44:45 localhost systemd[1]: Finished dracut initqueue hook. Oct 11 02:44:45 localhost systemd[1]: Reached target Preparation for Remote File Systems. Oct 11 02:44:45 localhost systemd[1]: Reached target Remote Encrypted Volumes. Oct 11 02:44:45 localhost systemd[1]: Reached target Remote File Systems. Oct 11 02:44:45 localhost systemd[1]: Starting dracut pre-mount hook... Oct 11 02:44:45 localhost systemd[1]: Finished dracut pre-mount hook. Oct 11 02:44:45 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a... Oct 11 02:44:45 localhost systemd-fsck[510]: /usr/sbin/fsck.xfs: XFS file system. Oct 11 02:44:45 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Oct 11 02:44:45 localhost systemd[1]: Mounting /sysroot... Oct 11 02:44:45 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Oct 11 02:44:45 localhost kernel: XFS (vda4): Mounting V5 Filesystem Oct 11 02:44:45 localhost kernel: XFS (vda4): Ending clean mount Oct 11 02:44:45 localhost systemd[1]: Mounted /sysroot. Oct 11 02:44:45 localhost systemd[1]: Reached target Initrd Root File System. Oct 11 02:44:45 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Oct 11 02:44:45 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 11 02:44:45 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Oct 11 02:44:45 localhost systemd[1]: Reached target Initrd File Systems. Oct 11 02:44:45 localhost systemd[1]: Reached target Initrd Default Target. Oct 11 02:44:45 localhost systemd[1]: Starting dracut mount hook... Oct 11 02:44:45 localhost systemd[1]: Finished dracut mount hook. Oct 11 02:44:45 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Oct 11 02:44:45 localhost rpc.idmapd[412]: exiting on signal 15 Oct 11 02:44:45 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Oct 11 02:44:45 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Oct 11 02:44:45 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Oct 11 02:44:45 localhost systemd[1]: Stopped target Network. Oct 11 02:44:45 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Oct 11 02:44:45 localhost systemd[1]: Stopped target Timer Units. Oct 11 02:44:45 localhost systemd[1]: dbus.socket: Deactivated successfully. Oct 11 02:44:45 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Oct 11 02:44:45 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 11 02:44:45 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Oct 11 02:44:45 localhost systemd[1]: Stopped target Initrd Default Target. Oct 11 02:44:45 localhost systemd[1]: Stopped target Basic System. Oct 11 02:44:45 localhost systemd[1]: Stopped target Initrd Root Device. Oct 11 02:44:45 localhost systemd[1]: Stopped target Initrd /usr File System. Oct 11 02:44:45 localhost systemd[1]: Stopped target Path Units. Oct 11 02:44:45 localhost systemd[1]: Stopped target Remote File Systems. Oct 11 02:44:45 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Oct 11 02:44:45 localhost systemd[1]: Stopped target Slice Units. Oct 11 02:44:45 localhost systemd[1]: Stopped target Socket Units. Oct 11 02:44:45 localhost systemd[1]: Stopped target System Initialization. Oct 11 02:44:46 localhost systemd[1]: Stopped target Local File Systems. Oct 11 02:44:46 localhost systemd[1]: Stopped target Swaps. Oct 11 02:44:46 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Stopped dracut mount hook. Oct 11 02:44:46 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Stopped dracut pre-mount hook. Oct 11 02:44:46 localhost systemd[1]: Stopped target Local Encrypted Volumes. Oct 11 02:44:46 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Oct 11 02:44:46 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Stopped dracut initqueue hook. Oct 11 02:44:46 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Stopped Apply Kernel Variables. Oct 11 02:44:46 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Stopped Load Kernel Modules. Oct 11 02:44:46 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Stopped Create Volatile Files and Directories. Oct 11 02:44:46 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Stopped Coldplug All udev Devices. Oct 11 02:44:46 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Stopped dracut pre-trigger hook. Oct 11 02:44:46 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Oct 11 02:44:46 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Stopped Setup Virtual Console. Oct 11 02:44:46 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Oct 11 02:44:46 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Oct 11 02:44:46 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Closed udev Control Socket. Oct 11 02:44:46 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Closed udev Kernel Socket. Oct 11 02:44:46 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Stopped dracut pre-udev hook. Oct 11 02:44:46 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Stopped dracut cmdline hook. Oct 11 02:44:46 localhost systemd[1]: Starting Cleanup udev Database... Oct 11 02:44:46 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Oct 11 02:44:46 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Stopped Create List of Static Device Nodes. Oct 11 02:44:46 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Stopped Create System Users. Oct 11 02:44:46 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 11 02:44:46 localhost systemd[1]: Finished Cleanup udev Database. Oct 11 02:44:46 localhost systemd[1]: Reached target Switch Root. Oct 11 02:44:46 localhost systemd[1]: Starting Switch Root... Oct 11 02:44:46 localhost systemd[1]: Switching root. Oct 11 02:44:46 localhost systemd-journald[284]: Journal stopped Oct 11 02:44:47 localhost systemd-journald[284]: Received SIGTERM from PID 1 (systemd). Oct 11 02:44:47 localhost kernel: audit: type=1404 audit(1760165086.277:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Oct 11 02:44:47 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 02:44:47 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 02:44:47 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 02:44:47 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 02:44:47 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 02:44:47 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 02:44:47 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 02:44:47 localhost kernel: audit: type=1403 audit(1760165086.407:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 11 02:44:47 localhost systemd[1]: Successfully loaded SELinux policy in 134.266ms. Oct 11 02:44:47 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 42.463ms. Oct 11 02:44:47 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 11 02:44:47 localhost systemd[1]: Detected virtualization kvm. Oct 11 02:44:47 localhost systemd[1]: Detected architecture x86-64. Oct 11 02:44:47 localhost systemd-rc-local-generator[580]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 02:44:47 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 02:44:47 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 11 02:44:47 localhost systemd[1]: Stopped Switch Root. Oct 11 02:44:47 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 11 02:44:47 localhost systemd[1]: Created slice Slice /system/getty. Oct 11 02:44:47 localhost systemd[1]: Created slice Slice /system/modprobe. Oct 11 02:44:47 localhost systemd[1]: Created slice Slice /system/serial-getty. Oct 11 02:44:47 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Oct 11 02:44:47 localhost systemd[1]: Created slice Slice /system/systemd-fsck. Oct 11 02:44:47 localhost systemd[1]: Created slice User and Session Slice. Oct 11 02:44:47 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Oct 11 02:44:47 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Oct 11 02:44:47 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Oct 11 02:44:47 localhost systemd[1]: Reached target Local Encrypted Volumes. Oct 11 02:44:47 localhost systemd[1]: Stopped target Switch Root. Oct 11 02:44:47 localhost systemd[1]: Stopped target Initrd File Systems. Oct 11 02:44:47 localhost systemd[1]: Stopped target Initrd Root File System. Oct 11 02:44:47 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Oct 11 02:44:47 localhost systemd[1]: Reached target Path Units. Oct 11 02:44:47 localhost systemd[1]: Reached target rpc_pipefs.target. Oct 11 02:44:47 localhost systemd[1]: Reached target Slice Units. Oct 11 02:44:47 localhost systemd[1]: Reached target Swaps. Oct 11 02:44:47 localhost systemd[1]: Reached target Local Verity Protected Volumes. Oct 11 02:44:47 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Oct 11 02:44:47 localhost systemd[1]: Reached target RPC Port Mapper. Oct 11 02:44:47 localhost systemd[1]: Listening on Process Core Dump Socket. Oct 11 02:44:47 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Oct 11 02:44:47 localhost systemd[1]: Listening on udev Control Socket. Oct 11 02:44:47 localhost systemd[1]: Listening on udev Kernel Socket. Oct 11 02:44:47 localhost systemd[1]: Mounting Huge Pages File System... Oct 11 02:44:47 localhost systemd[1]: Mounting POSIX Message Queue File System... Oct 11 02:44:47 localhost systemd[1]: Mounting Kernel Debug File System... Oct 11 02:44:47 localhost systemd[1]: Mounting Kernel Trace File System... Oct 11 02:44:47 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Oct 11 02:44:47 localhost systemd[1]: Starting Create List of Static Device Nodes... Oct 11 02:44:47 localhost systemd[1]: Starting Load Kernel Module configfs... Oct 11 02:44:47 localhost systemd[1]: Starting Load Kernel Module drm... Oct 11 02:44:47 localhost systemd[1]: Starting Load Kernel Module fuse... Oct 11 02:44:47 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Oct 11 02:44:47 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 11 02:44:47 localhost systemd[1]: Stopped File System Check on Root Device. Oct 11 02:44:47 localhost systemd[1]: Stopped Journal Service. Oct 11 02:44:47 localhost systemd[1]: Starting Journal Service... Oct 11 02:44:47 localhost systemd[1]: Starting Load Kernel Modules... Oct 11 02:44:47 localhost systemd[1]: Starting Generate network units from Kernel command line... Oct 11 02:44:47 localhost kernel: ACPI: bus type drm_connector registered Oct 11 02:44:47 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Oct 11 02:44:47 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Oct 11 02:44:47 localhost kernel: fuse: init (API version 7.36) Oct 11 02:44:47 localhost systemd[1]: Starting Coldplug All udev Devices... Oct 11 02:44:47 localhost systemd[1]: Mounted Huge Pages File System. Oct 11 02:44:47 localhost systemd-journald[617]: Journal started Oct 11 02:44:47 localhost systemd-journald[617]: Runtime Journal (/run/log/journal/0d75598033f175d0e781a840bff83569) is 8.0M, max 314.7M, 306.7M free. Oct 11 02:44:47 localhost systemd[1]: Queued start job for default target Multi-User System. Oct 11 02:44:47 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Oct 11 02:44:47 localhost systemd-modules-load[618]: Module 'msr' is built in Oct 11 02:44:47 localhost systemd[1]: Started Journal Service. Oct 11 02:44:47 localhost systemd[1]: Mounted POSIX Message Queue File System. Oct 11 02:44:47 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Oct 11 02:44:47 localhost systemd[1]: Mounted Kernel Debug File System. Oct 11 02:44:47 localhost systemd[1]: Mounted Kernel Trace File System. Oct 11 02:44:47 localhost systemd[1]: Finished Create List of Static Device Nodes. Oct 11 02:44:47 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 11 02:44:47 localhost systemd[1]: Finished Load Kernel Module configfs. Oct 11 02:44:47 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 11 02:44:47 localhost systemd[1]: Finished Load Kernel Module drm. Oct 11 02:44:47 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 11 02:44:47 localhost systemd[1]: Finished Load Kernel Module fuse. Oct 11 02:44:47 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Oct 11 02:44:47 localhost systemd[1]: Finished Load Kernel Modules. Oct 11 02:44:47 localhost systemd[1]: Finished Generate network units from Kernel command line. Oct 11 02:44:47 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Oct 11 02:44:47 localhost systemd[1]: Mounting FUSE Control File System... Oct 11 02:44:47 localhost systemd[1]: Mounting Kernel Configuration File System... Oct 11 02:44:47 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Oct 11 02:44:47 localhost systemd[1]: Starting Rebuild Hardware Database... Oct 11 02:44:47 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Oct 11 02:44:47 localhost systemd[1]: Starting Load/Save Random Seed... Oct 11 02:44:47 localhost systemd[1]: Starting Apply Kernel Variables... Oct 11 02:44:47 localhost systemd[1]: Starting Create System Users... Oct 11 02:44:47 localhost systemd-journald[617]: Runtime Journal (/run/log/journal/0d75598033f175d0e781a840bff83569) is 8.0M, max 314.7M, 306.7M free. Oct 11 02:44:47 localhost systemd-journald[617]: Received client request to flush runtime journal. Oct 11 02:44:47 localhost systemd[1]: Mounted FUSE Control File System. Oct 11 02:44:47 localhost systemd[1]: Mounted Kernel Configuration File System. Oct 11 02:44:47 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Oct 11 02:44:47 localhost systemd[1]: Finished Coldplug All udev Devices. Oct 11 02:44:47 localhost systemd[1]: Finished Apply Kernel Variables. Oct 11 02:44:47 localhost systemd[1]: Finished Load/Save Random Seed. Oct 11 02:44:47 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Oct 11 02:44:47 localhost systemd-sysusers[630]: Creating group 'sgx' with GID 989. Oct 11 02:44:47 localhost systemd-sysusers[630]: Creating group 'systemd-oom' with GID 988. Oct 11 02:44:47 localhost systemd-sysusers[630]: Creating user 'systemd-oom' (systemd Userspace OOM Killer) with UID 988 and GID 988. Oct 11 02:44:47 localhost systemd[1]: Finished Create System Users. Oct 11 02:44:47 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Oct 11 02:44:47 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Oct 11 02:44:47 localhost systemd[1]: Reached target Preparation for Local File Systems. Oct 11 02:44:47 localhost systemd[1]: Set up automount EFI System Partition Automount. Oct 11 02:44:47 localhost systemd[1]: Finished Rebuild Hardware Database. Oct 11 02:44:47 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Oct 11 02:44:47 localhost systemd-udevd[634]: Using default interface naming scheme 'rhel-9.0'. Oct 11 02:44:47 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Oct 11 02:44:47 localhost systemd[1]: Starting Load Kernel Module configfs... Oct 11 02:44:47 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 11 02:44:47 localhost systemd[1]: Finished Load Kernel Module configfs. Oct 11 02:44:47 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Oct 11 02:44:47 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/b141154b-6a70-437a-a97f-d160c9ba37eb being skipped. Oct 11 02:44:47 localhost systemd-udevd[639]: Network interface NamePolicy= disabled on kernel command line. Oct 11 02:44:47 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/7B77-95E7 being skipped. Oct 11 02:44:47 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/7B77-95E7... Oct 11 02:44:47 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Oct 11 02:44:47 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Oct 11 02:44:47 localhost systemd-fsck[677]: fsck.fat 4.2 (2021-01-31) Oct 11 02:44:47 localhost systemd-fsck[677]: /dev/vda2: 12 files, 1782/51145 clusters Oct 11 02:44:47 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/7B77-95E7. Oct 11 02:44:47 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Oct 11 02:44:47 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Oct 11 02:44:47 localhost kernel: Console: switching to colour dummy device 80x25 Oct 11 02:44:47 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Oct 11 02:44:47 localhost kernel: [drm] features: -context_init Oct 11 02:44:47 localhost kernel: [drm] number of scanouts: 1 Oct 11 02:44:47 localhost kernel: [drm] number of cap sets: 0 Oct 11 02:44:47 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 0 for virtio0 on minor 0 Oct 11 02:44:47 localhost kernel: virtio_gpu virtio0: [drm] drm_plane_enable_fb_damage_clips() not called Oct 11 02:44:47 localhost kernel: Console: switching to colour frame buffer device 128x48 Oct 11 02:44:47 localhost kernel: virtio_gpu virtio0: [drm] fb0: virtio_gpudrmfb frame buffer device Oct 11 02:44:47 localhost kernel: SVM: TSC scaling supported Oct 11 02:44:47 localhost kernel: kvm: Nested Virtualization enabled Oct 11 02:44:47 localhost kernel: SVM: kvm: Nested Paging enabled Oct 11 02:44:47 localhost kernel: SVM: LBR virtualization supported Oct 11 02:44:48 localhost systemd[1]: Mounting /boot... Oct 11 02:44:48 localhost kernel: XFS (vda3): Mounting V5 Filesystem Oct 11 02:44:48 localhost kernel: XFS (vda3): Ending clean mount Oct 11 02:44:48 localhost kernel: xfs filesystem being mounted at /boot supports timestamps until 2038 (0x7fffffff) Oct 11 02:44:48 localhost systemd[1]: Mounted /boot. Oct 11 02:44:48 localhost systemd[1]: Mounting /boot/efi... Oct 11 02:44:48 localhost systemd[1]: Mounted /boot/efi. Oct 11 02:44:48 localhost systemd[1]: Reached target Local File Systems. Oct 11 02:44:48 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Oct 11 02:44:48 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Oct 11 02:44:48 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Oct 11 02:44:48 localhost systemd[1]: Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 11 02:44:48 localhost systemd[1]: Starting Automatic Boot Loader Update... Oct 11 02:44:48 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Oct 11 02:44:48 localhost systemd[1]: Starting Create Volatile Files and Directories... Oct 11 02:44:48 localhost systemd[1]: efi.automount: Got automount request for /efi, triggered by 716 (bootctl) Oct 11 02:44:48 localhost systemd[1]: Starting File System Check on /dev/vda2... Oct 11 02:44:48 localhost systemd[1]: Finished File System Check on /dev/vda2. Oct 11 02:44:48 localhost systemd[1]: Mounting EFI System Partition Automount... Oct 11 02:44:48 localhost systemd[1]: Mounted EFI System Partition Automount. Oct 11 02:44:48 localhost systemd[1]: Finished Automatic Boot Loader Update. Oct 11 02:44:48 localhost systemd[1]: Finished Create Volatile Files and Directories. Oct 11 02:44:48 localhost systemd[1]: Starting Security Auditing Service... Oct 11 02:44:48 localhost systemd[1]: Starting RPC Bind... Oct 11 02:44:48 localhost systemd[1]: Starting Rebuild Journal Catalog... Oct 11 02:44:48 localhost auditd[725]: audit dispatcher initialized with q_depth=1200 and 1 active plugins Oct 11 02:44:48 localhost auditd[725]: Init complete, auditd 3.0.7 listening for events (startup state enable) Oct 11 02:44:48 localhost systemd[1]: Finished Rebuild Journal Catalog. Oct 11 02:44:48 localhost systemd[1]: Started RPC Bind. Oct 11 02:44:48 localhost augenrules[730]: /sbin/augenrules: No change Oct 11 02:44:48 localhost augenrules[740]: No rules Oct 11 02:44:48 localhost augenrules[740]: enabled 1 Oct 11 02:44:48 localhost augenrules[740]: failure 1 Oct 11 02:44:48 localhost augenrules[740]: pid 725 Oct 11 02:44:48 localhost augenrules[740]: rate_limit 0 Oct 11 02:44:48 localhost augenrules[740]: backlog_limit 8192 Oct 11 02:44:48 localhost augenrules[740]: lost 0 Oct 11 02:44:48 localhost augenrules[740]: backlog 3 Oct 11 02:44:48 localhost augenrules[740]: backlog_wait_time 60000 Oct 11 02:44:48 localhost augenrules[740]: backlog_wait_time_actual 0 Oct 11 02:44:48 localhost augenrules[740]: enabled 1 Oct 11 02:44:48 localhost augenrules[740]: failure 1 Oct 11 02:44:48 localhost augenrules[740]: pid 725 Oct 11 02:44:48 localhost augenrules[740]: rate_limit 0 Oct 11 02:44:48 localhost augenrules[740]: backlog_limit 8192 Oct 11 02:44:48 localhost augenrules[740]: lost 0 Oct 11 02:44:48 localhost augenrules[740]: backlog 4 Oct 11 02:44:48 localhost augenrules[740]: backlog_wait_time 60000 Oct 11 02:44:48 localhost augenrules[740]: backlog_wait_time_actual 0 Oct 11 02:44:48 localhost augenrules[740]: enabled 1 Oct 11 02:44:48 localhost augenrules[740]: failure 1 Oct 11 02:44:48 localhost augenrules[740]: pid 725 Oct 11 02:44:48 localhost augenrules[740]: rate_limit 0 Oct 11 02:44:48 localhost augenrules[740]: backlog_limit 8192 Oct 11 02:44:48 localhost augenrules[740]: lost 0 Oct 11 02:44:48 localhost augenrules[740]: backlog 4 Oct 11 02:44:48 localhost augenrules[740]: backlog_wait_time 60000 Oct 11 02:44:48 localhost augenrules[740]: backlog_wait_time_actual 0 Oct 11 02:44:48 localhost systemd[1]: Started Security Auditing Service. Oct 11 02:44:48 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Oct 11 02:44:48 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Oct 11 02:44:48 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Oct 11 02:44:48 localhost systemd[1]: Starting Update is Completed... Oct 11 02:44:48 localhost systemd[1]: Finished Update is Completed. Oct 11 02:44:48 localhost systemd[1]: Reached target System Initialization. Oct 11 02:44:48 localhost systemd[1]: Started dnf makecache --timer. Oct 11 02:44:48 localhost systemd[1]: Started Daily rotation of log files. Oct 11 02:44:48 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Oct 11 02:44:48 localhost systemd[1]: Reached target Timer Units. Oct 11 02:44:48 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Oct 11 02:44:48 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Oct 11 02:44:48 localhost systemd[1]: Reached target Socket Units. Oct 11 02:44:48 localhost systemd[1]: Starting Initial cloud-init job (pre-networking)... Oct 11 02:44:48 localhost systemd[1]: Starting D-Bus System Message Bus... Oct 11 02:44:48 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 11 02:44:48 localhost systemd[1]: Started D-Bus System Message Bus. Oct 11 02:44:48 localhost systemd[1]: Reached target Basic System. Oct 11 02:44:48 localhost journal[750]: Ready Oct 11 02:44:48 localhost systemd[1]: Starting NTP client/server... Oct 11 02:44:48 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Oct 11 02:44:48 localhost systemd[1]: Started irqbalance daemon. Oct 11 02:44:48 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Oct 11 02:44:48 localhost systemd[1]: Starting System Logging Service... Oct 11 02:44:48 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 02:44:48 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 02:44:48 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 02:44:48 localhost systemd[1]: Reached target sshd-keygen.target. Oct 11 02:44:48 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Oct 11 02:44:48 localhost systemd[1]: Reached target User and Group Name Lookups. Oct 11 02:44:48 localhost rsyslogd[758]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="758" x-info="https://www.rsyslog.com"] start Oct 11 02:44:48 localhost rsyslogd[758]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2040 ] Oct 11 02:44:48 localhost systemd[1]: Starting User Login Management... Oct 11 02:44:48 localhost systemd[1]: Started System Logging Service. Oct 11 02:44:48 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Oct 11 02:44:48 localhost chronyd[765]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Oct 11 02:44:49 localhost systemd-logind[763]: New seat seat0. Oct 11 02:44:49 localhost chronyd[765]: Using right/UTC timezone to obtain leap second data Oct 11 02:44:49 localhost chronyd[765]: Loaded seccomp filter (level 2) Oct 11 02:44:49 localhost systemd-logind[763]: Watching system buttons on /dev/input/event0 (Power Button) Oct 11 02:44:49 localhost systemd-logind[763]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Oct 11 02:44:49 localhost systemd[1]: Started NTP client/server. Oct 11 02:44:49 localhost systemd[1]: Started User Login Management. Oct 11 02:44:49 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 02:44:49 localhost cloud-init[769]: Cloud-init v. 22.1-9.el9 running 'init-local' at Sat, 11 Oct 2025 06:44:49 +0000. Up 6.82 seconds. Oct 11 02:44:49 localhost systemd[1]: run-cloud\x2dinit-tmp-tmpez4_a4ej.mount: Deactivated successfully. Oct 11 02:44:49 localhost systemd[1]: Starting Hostname Service... Oct 11 02:44:50 localhost systemd[1]: Started Hostname Service. Oct 11 02:44:50 localhost systemd-hostnamed[783]: Hostname set to (static) Oct 11 02:44:50 localhost systemd[1]: Finished Initial cloud-init job (pre-networking). Oct 11 02:44:50 localhost systemd[1]: Reached target Preparation for Network. Oct 11 02:44:50 localhost systemd[1]: Starting Network Manager... Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.2454] NetworkManager (version 1.42.2-1.el9) is starting... (boot:6b3aa2b3-4af4-42d1-8b95-0a2ae6501f29) Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.2460] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Oct 11 02:44:50 localhost systemd[1]: Started Network Manager. Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.2513] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Oct 11 02:44:50 localhost systemd[1]: Reached target Network. Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.2586] manager[0x55f8536cc020]: monitoring kernel firmware directory '/lib/firmware'. Oct 11 02:44:50 localhost systemd[1]: Starting Network Manager Wait Online... Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.2627] hostname: hostname: using hostnamed Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.2627] hostname: static hostname changed from (none) to "np0005481015.novalocal" Oct 11 02:44:50 localhost systemd[1]: Starting GSSAPI Proxy Daemon... Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.2640] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Oct 11 02:44:50 localhost systemd[1]: Starting Enable periodic update of entitlement certificates.... Oct 11 02:44:50 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.2806] manager[0x55f8536cc020]: rfkill: Wi-Fi hardware radio set enabled Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.2806] manager[0x55f8536cc020]: rfkill: WWAN hardware radio set enabled Oct 11 02:44:50 localhost systemd[1]: Started GSSAPI Proxy Daemon. Oct 11 02:44:50 localhost systemd[1]: Started Enable periodic update of entitlement certificates.. Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.2872] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.2872] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.2882] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.2884] manager: Networking is enabled by state file Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.2926] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.2927] settings: Loaded settings plugin: keyfile (internal) Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.2961] dhcp: init: Using DHCP client 'internal' Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.2967] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Oct 11 02:44:50 localhost systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.2992] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3002] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3014] device (lo): Activation: starting connection 'lo' (74d3bfab-7353-4e3e-8e40-408d23166cb2) Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3028] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Oct 11 02:44:50 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3036] device (eth0): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Oct 11 02:44:50 localhost systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Oct 11 02:44:50 localhost systemd[1]: Reached target NFS client services. Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3085] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3087] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3088] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3090] device (eth0): carrier: link connected Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3098] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Oct 11 02:44:50 localhost systemd[1]: Reached target Preparation for Remote File Systems. Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3116] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Oct 11 02:44:50 localhost systemd[1]: Reached target Remote File Systems. Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3159] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Oct 11 02:44:50 localhost systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3163] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3164] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3171] manager: NetworkManager state is now CONNECTING Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3177] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3185] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3191] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Oct 11 02:44:50 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3238] dhcp4 (eth0): state changed new lease, address=38.102.83.132 Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3241] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3271] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed') Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3283] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3288] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3301] device (lo): Activation: successful, device activated. Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3322] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed') Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3324] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed') Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3333] manager: NetworkManager state is now CONNECTED_SITE Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3340] device (eth0): Activation: successful, device activated. Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3352] manager: NetworkManager state is now CONNECTED_GLOBAL Oct 11 02:44:50 localhost NetworkManager[788]: [1760165090.3361] manager: startup complete Oct 11 02:44:50 localhost systemd[1]: Finished Network Manager Wait Online. Oct 11 02:44:50 localhost systemd[1]: Starting Initial cloud-init job (metadata service crawler)... Oct 11 02:44:50 localhost cloud-init[900]: Cloud-init v. 22.1-9.el9 running 'init' at Sat, 11 Oct 2025 06:44:50 +0000. Up 7.76 seconds. Oct 11 02:44:50 localhost cloud-init[900]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Oct 11 02:44:50 localhost cloud-init[900]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Oct 11 02:44:50 localhost cloud-init[900]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Oct 11 02:44:50 localhost cloud-init[900]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Oct 11 02:44:50 localhost cloud-init[900]: ci-info: | eth0 | True | 38.102.83.132 | 255.255.255.0 | global | fa:16:3e:6d:87:29 | Oct 11 02:44:50 localhost cloud-init[900]: ci-info: | eth0 | True | fe80::f816:3eff:fe6d:8729/64 | . | link | fa:16:3e:6d:87:29 | Oct 11 02:44:50 localhost cloud-init[900]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Oct 11 02:44:50 localhost cloud-init[900]: ci-info: | lo | True | ::1/128 | . | host | . | Oct 11 02:44:50 localhost cloud-init[900]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Oct 11 02:44:50 localhost cloud-init[900]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Oct 11 02:44:50 localhost cloud-init[900]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Oct 11 02:44:50 localhost cloud-init[900]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Oct 11 02:44:50 localhost cloud-init[900]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Oct 11 02:44:50 localhost cloud-init[900]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Oct 11 02:44:50 localhost cloud-init[900]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Oct 11 02:44:50 localhost cloud-init[900]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Oct 11 02:44:50 localhost cloud-init[900]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Oct 11 02:44:50 localhost cloud-init[900]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Oct 11 02:44:50 localhost cloud-init[900]: ci-info: +-------+-------------+---------+-----------+-------+ Oct 11 02:44:50 localhost cloud-init[900]: ci-info: | Route | Destination | Gateway | Interface | Flags | Oct 11 02:44:50 localhost cloud-init[900]: ci-info: +-------+-------------+---------+-----------+-------+ Oct 11 02:44:50 localhost cloud-init[900]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Oct 11 02:44:50 localhost cloud-init[900]: ci-info: | 3 | multicast | :: | eth0 | U | Oct 11 02:44:50 localhost cloud-init[900]: ci-info: +-------+-------------+---------+-----------+-------+ Oct 11 02:44:50 localhost systemd[1]: Starting Authorization Manager... Oct 11 02:44:50 localhost systemd[1]: Started Dynamic System Tuning Daemon. Oct 11 02:44:50 localhost polkitd[1035]: Started polkitd version 0.117 Oct 11 02:44:50 localhost systemd[1]: Started Authorization Manager. Oct 11 02:44:53 localhost cloud-init[900]: Generating public/private rsa key pair. Oct 11 02:44:53 localhost cloud-init[900]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Oct 11 02:44:53 localhost cloud-init[900]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Oct 11 02:44:53 localhost cloud-init[900]: The key fingerprint is: Oct 11 02:44:53 localhost cloud-init[900]: SHA256:pjCj7ulLl2wi+bEm+C1wMfdLQsgrma4ai/nrshlAPHs root@np0005481015.novalocal Oct 11 02:44:53 localhost cloud-init[900]: The key's randomart image is: Oct 11 02:44:53 localhost cloud-init[900]: +---[RSA 3072]----+ Oct 11 02:44:53 localhost cloud-init[900]: | | Oct 11 02:44:53 localhost cloud-init[900]: |. | Oct 11 02:44:53 localhost cloud-init[900]: | = . | Oct 11 02:44:53 localhost cloud-init[900]: |. B o | Oct 11 02:44:53 localhost cloud-init[900]: |.+ E+. S | Oct 11 02:44:53 localhost cloud-init[900]: |*.+o.=oo | Oct 11 02:44:53 localhost cloud-init[900]: |B+= =o.. | Oct 11 02:44:53 localhost cloud-init[900]: |=%oO . | Oct 11 02:44:53 localhost cloud-init[900]: |@@&+. | Oct 11 02:44:53 localhost cloud-init[900]: +----[SHA256]-----+ Oct 11 02:44:53 localhost cloud-init[900]: Generating public/private ecdsa key pair. Oct 11 02:44:53 localhost cloud-init[900]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Oct 11 02:44:53 localhost cloud-init[900]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Oct 11 02:44:53 localhost cloud-init[900]: The key fingerprint is: Oct 11 02:44:53 localhost cloud-init[900]: SHA256:Sh9eYvjVzHPKkAAqyIwsv5hG/5HAa9sOVLnNA69inlY root@np0005481015.novalocal Oct 11 02:44:53 localhost cloud-init[900]: The key's randomart image is: Oct 11 02:44:53 localhost cloud-init[900]: +---[ECDSA 256]---+ Oct 11 02:44:53 localhost cloud-init[900]: | . | Oct 11 02:44:53 localhost cloud-init[900]: |=. ... | Oct 11 02:44:53 localhost cloud-init[900]: |++. .+ . | Oct 11 02:44:53 localhost cloud-init[900]: |..... *. . = | Oct 11 02:44:53 localhost cloud-init[900]: | ..+ .o=S = = . | Oct 11 02:44:53 localhost cloud-init[900]: |.oo.oEo*.= o + | Oct 11 02:44:53 localhost cloud-init[900]: |o..B.+. + o | Oct 11 02:44:53 localhost cloud-init[900]: |. +.B . | Oct 11 02:44:53 localhost cloud-init[900]: | .+.+ | Oct 11 02:44:53 localhost cloud-init[900]: +----[SHA256]-----+ Oct 11 02:44:53 localhost cloud-init[900]: Generating public/private ed25519 key pair. Oct 11 02:44:53 localhost cloud-init[900]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Oct 11 02:44:53 localhost cloud-init[900]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Oct 11 02:44:53 localhost cloud-init[900]: The key fingerprint is: Oct 11 02:44:53 localhost cloud-init[900]: SHA256:+656fBYNmrbGtqWFVd3Gzcy2yK5IE6JO8ZXKPX+bRxg root@np0005481015.novalocal Oct 11 02:44:53 localhost cloud-init[900]: The key's randomart image is: Oct 11 02:44:53 localhost cloud-init[900]: +--[ED25519 256]--+ Oct 11 02:44:53 localhost cloud-init[900]: | | Oct 11 02:44:53 localhost cloud-init[900]: | . *.| Oct 11 02:44:53 localhost cloud-init[900]: | . . X| Oct 11 02:44:53 localhost cloud-init[900]: | o..E.o.| Oct 11 02:44:53 localhost cloud-init[900]: | . .S*.o oo. | Oct 11 02:44:53 localhost cloud-init[900]: | = O+o o. . | Oct 11 02:44:53 localhost cloud-init[900]: | o Bo*o. .. | Oct 11 02:44:53 localhost cloud-init[900]: | o O=B .... | Oct 11 02:44:53 localhost cloud-init[900]: | ..=+Boo.oo | Oct 11 02:44:53 localhost cloud-init[900]: +----[SHA256]-----+ Oct 11 02:44:53 localhost systemd[1]: Finished Initial cloud-init job (metadata service crawler). Oct 11 02:44:53 localhost systemd[1]: Reached target Cloud-config availability. Oct 11 02:44:53 localhost systemd[1]: Reached target Network is Online. Oct 11 02:44:53 localhost systemd[1]: Starting Apply the settings specified in cloud-config... Oct 11 02:44:53 localhost systemd[1]: Run Insights Client at boot was skipped because of an unmet condition check (ConditionPathExists=/etc/insights-client/.run_insights_client_next_boot). Oct 11 02:44:53 localhost systemd[1]: Starting Crash recovery kernel arming... Oct 11 02:44:53 localhost systemd[1]: Starting Notify NFS peers of a restart... Oct 11 02:44:53 localhost systemd[1]: Starting OpenSSH server daemon... Oct 11 02:44:53 localhost sm-notify[1131]: Version 2.5.4 starting Oct 11 02:44:53 localhost systemd[1]: Starting Permit User Sessions... Oct 11 02:44:53 localhost systemd[1]: Started Notify NFS peers of a restart. Oct 11 02:44:53 localhost systemd[1]: Finished Permit User Sessions. Oct 11 02:44:53 localhost sshd[1132]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:44:53 localhost systemd[1]: Started Command Scheduler. Oct 11 02:44:53 localhost systemd[1]: Started Getty on tty1. Oct 11 02:44:53 localhost systemd[1]: Started Serial Getty on ttyS0. Oct 11 02:44:53 localhost systemd[1]: Reached target Login Prompts. Oct 11 02:44:53 localhost systemd[1]: Started OpenSSH server daemon. Oct 11 02:44:53 localhost systemd[1]: Reached target Multi-User System. Oct 11 02:44:53 localhost sshd[1141]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:44:53 localhost systemd[1]: Starting Record Runlevel Change in UTMP... Oct 11 02:44:53 localhost systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 11 02:44:53 localhost systemd[1]: Finished Record Runlevel Change in UTMP. Oct 11 02:44:53 localhost sshd[1152]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:44:53 localhost sshd[1168]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:44:53 localhost sshd[1173]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:44:53 localhost sshd[1184]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:44:53 localhost kdumpctl[1135]: kdump: No kdump initial ramdisk found. Oct 11 02:44:53 localhost kdumpctl[1135]: kdump: Rebuilding /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img Oct 11 02:44:53 localhost sshd[1199]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:44:53 localhost sshd[1215]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:44:54 localhost sshd[1264]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:44:54 localhost cloud-init[1273]: Cloud-init v. 22.1-9.el9 running 'modules:config' at Sat, 11 Oct 2025 06:44:53 +0000. Up 11.18 seconds. Oct 11 02:44:54 localhost sshd[1274]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:44:54 localhost systemd[1]: Finished Apply the settings specified in cloud-config. Oct 11 02:44:54 localhost systemd[1]: Starting Execute cloud user/final scripts... Oct 11 02:44:54 localhost cloud-init[1436]: Cloud-init v. 22.1-9.el9 running 'modules:final' at Sat, 11 Oct 2025 06:44:54 +0000. Up 11.53 seconds. Oct 11 02:44:54 localhost dracut[1438]: dracut-057-21.git20230214.el9 Oct 11 02:44:54 localhost cloud-init[1455]: ############################################################# Oct 11 02:44:54 localhost cloud-init[1456]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Oct 11 02:44:54 localhost cloud-init[1458]: 256 SHA256:Sh9eYvjVzHPKkAAqyIwsv5hG/5HAa9sOVLnNA69inlY root@np0005481015.novalocal (ECDSA) Oct 11 02:44:54 localhost cloud-init[1460]: 256 SHA256:+656fBYNmrbGtqWFVd3Gzcy2yK5IE6JO8ZXKPX+bRxg root@np0005481015.novalocal (ED25519) Oct 11 02:44:54 localhost cloud-init[1465]: 3072 SHA256:pjCj7ulLl2wi+bEm+C1wMfdLQsgrma4ai/nrshlAPHs root@np0005481015.novalocal (RSA) Oct 11 02:44:54 localhost cloud-init[1468]: -----END SSH HOST KEY FINGERPRINTS----- Oct 11 02:44:54 localhost cloud-init[1470]: ############################################################# Oct 11 02:44:54 localhost dracut[1440]: Executing: /usr/bin/dracut --add kdumpbase --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics -o "plymouth resume ifcfg earlykdump" --mount "/dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device -f /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img 5.14.0-284.11.1.el9_2.x86_64 Oct 11 02:44:54 localhost cloud-init[1436]: Cloud-init v. 22.1-9.el9 finished at Sat, 11 Oct 2025 06:44:54 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 11.77 seconds Oct 11 02:44:54 localhost dracut[1440]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Oct 11 02:44:54 localhost systemd[1]: Reloading Network Manager... Oct 11 02:44:54 localhost dracut[1440]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Oct 11 02:44:54 localhost NetworkManager[788]: [1760165094.7064] audit: op="reload" arg="0" pid=1592 uid=0 result="success" Oct 11 02:44:54 localhost NetworkManager[788]: [1760165094.7072] config: signal: SIGHUP (no changes from disk) Oct 11 02:44:54 localhost systemd[1]: Reloaded Network Manager. Oct 11 02:44:54 localhost dracut[1440]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Oct 11 02:44:54 localhost systemd[1]: Finished Execute cloud user/final scripts. Oct 11 02:44:54 localhost systemd[1]: Reached target Cloud-init target. Oct 11 02:44:54 localhost dracut[1440]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Oct 11 02:44:54 localhost dracut[1440]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Oct 11 02:44:54 localhost dracut[1440]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Oct 11 02:44:55 localhost dracut[1440]: memstrack is not available Oct 11 02:44:55 localhost dracut[1440]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Oct 11 02:44:55 localhost dracut[1440]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Oct 11 02:44:55 localhost dracut[1440]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Oct 11 02:44:55 localhost chronyd[765]: Selected source 167.160.187.179 (2.rhel.pool.ntp.org) Oct 11 02:44:55 localhost chronyd[765]: System clock TAI offset set to 37 seconds Oct 11 02:44:55 localhost dracut[1440]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Oct 11 02:44:55 localhost dracut[1440]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Oct 11 02:44:55 localhost dracut[1440]: memstrack is not available Oct 11 02:44:55 localhost dracut[1440]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Oct 11 02:44:55 localhost dracut[1440]: *** Including module: systemd *** Oct 11 02:44:56 localhost dracut[1440]: *** Including module: systemd-initrd *** Oct 11 02:44:56 localhost dracut[1440]: *** Including module: i18n *** Oct 11 02:44:56 localhost dracut[1440]: No KEYMAP configured. Oct 11 02:44:56 localhost dracut[1440]: *** Including module: drm *** Oct 11 02:44:56 localhost dracut[1440]: *** Including module: prefixdevname *** Oct 11 02:44:56 localhost dracut[1440]: *** Including module: kernel-modules *** Oct 11 02:44:56 localhost chronyd[765]: Selected source 206.108.0.133 (2.rhel.pool.ntp.org) Oct 11 02:44:57 localhost dracut[1440]: *** Including module: kernel-modules-extra *** Oct 11 02:44:57 localhost dracut[1440]: *** Including module: qemu *** Oct 11 02:44:57 localhost dracut[1440]: *** Including module: fstab-sys *** Oct 11 02:44:57 localhost dracut[1440]: *** Including module: rootfs-block *** Oct 11 02:44:57 localhost dracut[1440]: *** Including module: terminfo *** Oct 11 02:44:57 localhost dracut[1440]: *** Including module: udev-rules *** Oct 11 02:44:57 localhost dracut[1440]: Skipping udev rule: 91-permissions.rules Oct 11 02:44:57 localhost dracut[1440]: Skipping udev rule: 80-drivers-modprobe.rules Oct 11 02:44:58 localhost dracut[1440]: *** Including module: virtiofs *** Oct 11 02:44:58 localhost dracut[1440]: *** Including module: dracut-systemd *** Oct 11 02:44:58 localhost dracut[1440]: *** Including module: usrmount *** Oct 11 02:44:58 localhost dracut[1440]: *** Including module: base *** Oct 11 02:44:58 localhost dracut[1440]: *** Including module: fs-lib *** Oct 11 02:44:58 localhost dracut[1440]: *** Including module: kdumpbase *** Oct 11 02:44:58 localhost dracut[1440]: *** Including module: microcode_ctl-fw_dir_override *** Oct 11 02:44:58 localhost dracut[1440]: microcode_ctl module: mangling fw_dir Oct 11 02:44:58 localhost dracut[1440]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Oct 11 02:44:58 localhost dracut[1440]: microcode_ctl: configuration "intel" is ignored Oct 11 02:44:58 localhost dracut[1440]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Oct 11 02:44:58 localhost dracut[1440]: microcode_ctl: configuration "intel-06-2d-07" is ignored Oct 11 02:44:58 localhost dracut[1440]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Oct 11 02:44:58 localhost dracut[1440]: microcode_ctl: configuration "intel-06-4e-03" is ignored Oct 11 02:44:58 localhost dracut[1440]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Oct 11 02:44:58 localhost dracut[1440]: microcode_ctl: configuration "intel-06-4f-01" is ignored Oct 11 02:44:58 localhost dracut[1440]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Oct 11 02:44:58 localhost dracut[1440]: microcode_ctl: configuration "intel-06-55-04" is ignored Oct 11 02:44:58 localhost dracut[1440]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Oct 11 02:44:58 localhost dracut[1440]: microcode_ctl: configuration "intel-06-5e-03" is ignored Oct 11 02:44:58 localhost dracut[1440]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Oct 11 02:44:58 localhost dracut[1440]: microcode_ctl: configuration "intel-06-8c-01" is ignored Oct 11 02:44:58 localhost dracut[1440]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Oct 11 02:44:58 localhost dracut[1440]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Oct 11 02:44:58 localhost dracut[1440]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Oct 11 02:44:59 localhost dracut[1440]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Oct 11 02:44:59 localhost dracut[1440]: microcode_ctl: final fw_dir: "/lib/firmware/updates/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware/updates /lib/firmware/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware" Oct 11 02:44:59 localhost dracut[1440]: *** Including module: shutdown *** Oct 11 02:44:59 localhost dracut[1440]: *** Including module: squash *** Oct 11 02:44:59 localhost dracut[1440]: *** Including modules done *** Oct 11 02:44:59 localhost dracut[1440]: *** Installing kernel module dependencies *** Oct 11 02:44:59 localhost dracut[1440]: *** Installing kernel module dependencies done *** Oct 11 02:44:59 localhost dracut[1440]: *** Resolving executable dependencies *** Oct 11 02:45:00 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Oct 11 02:45:01 localhost dracut[1440]: *** Resolving executable dependencies done *** Oct 11 02:45:01 localhost dracut[1440]: *** Hardlinking files *** Oct 11 02:45:01 localhost dracut[1440]: Mode: real Oct 11 02:45:01 localhost dracut[1440]: Files: 1099 Oct 11 02:45:01 localhost dracut[1440]: Linked: 3 files Oct 11 02:45:01 localhost dracut[1440]: Compared: 0 xattrs Oct 11 02:45:01 localhost dracut[1440]: Compared: 373 files Oct 11 02:45:01 localhost dracut[1440]: Saved: 61.04 KiB Oct 11 02:45:01 localhost dracut[1440]: Duration: 0.051479 seconds Oct 11 02:45:01 localhost dracut[1440]: *** Hardlinking files done *** Oct 11 02:45:01 localhost dracut[1440]: Could not find 'strip'. Not stripping the initramfs. Oct 11 02:45:01 localhost dracut[1440]: *** Generating early-microcode cpio image *** Oct 11 02:45:01 localhost dracut[1440]: *** Constructing AuthenticAMD.bin *** Oct 11 02:45:01 localhost dracut[1440]: *** Store current command line parameters *** Oct 11 02:45:01 localhost dracut[1440]: Stored kernel commandline: Oct 11 02:45:01 localhost dracut[1440]: No dracut internal kernel commandline stored in the initramfs Oct 11 02:45:01 localhost dracut[1440]: *** Install squash loader *** Oct 11 02:45:02 localhost dracut[1440]: *** Squashing the files inside the initramfs *** Oct 11 02:45:03 localhost dracut[1440]: *** Squashing the files inside the initramfs done *** Oct 11 02:45:03 localhost dracut[1440]: *** Creating image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' *** Oct 11 02:45:03 localhost dracut[1440]: *** Creating initramfs image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' done *** Oct 11 02:45:03 localhost kdumpctl[1135]: kdump: kexec: loaded kdump kernel Oct 11 02:45:03 localhost kdumpctl[1135]: kdump: Starting kdump: [OK] Oct 11 02:45:03 localhost systemd[1]: Finished Crash recovery kernel arming. Oct 11 02:45:03 localhost systemd[1]: Startup finished in 1.238s (kernel) + 2.227s (initrd) + 17.414s (userspace) = 20.880s. Oct 11 02:45:20 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 11 02:45:29 localhost sshd[4176]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:45:29 localhost systemd[1]: Created slice User Slice of UID 1000. Oct 11 02:45:29 localhost systemd[1]: Starting User Runtime Directory /run/user/1000... Oct 11 02:45:29 localhost systemd-logind[763]: New session 1 of user zuul. Oct 11 02:45:29 localhost systemd[1]: Finished User Runtime Directory /run/user/1000. Oct 11 02:45:29 localhost systemd[1]: Starting User Manager for UID 1000... Oct 11 02:45:29 localhost systemd[4180]: Queued start job for default target Main User Target. Oct 11 02:45:29 localhost systemd[4180]: Created slice User Application Slice. Oct 11 02:45:29 localhost systemd[4180]: Started Mark boot as successful after the user session has run 2 minutes. Oct 11 02:45:29 localhost systemd[4180]: Started Daily Cleanup of User's Temporary Directories. Oct 11 02:45:29 localhost systemd[4180]: Reached target Paths. Oct 11 02:45:29 localhost systemd[4180]: Reached target Timers. Oct 11 02:45:29 localhost systemd[4180]: Starting D-Bus User Message Bus Socket... Oct 11 02:45:29 localhost systemd[4180]: Starting Create User's Volatile Files and Directories... Oct 11 02:45:29 localhost systemd[4180]: Finished Create User's Volatile Files and Directories. Oct 11 02:45:29 localhost systemd[4180]: Listening on D-Bus User Message Bus Socket. Oct 11 02:45:29 localhost systemd[4180]: Reached target Sockets. Oct 11 02:45:29 localhost systemd[4180]: Reached target Basic System. Oct 11 02:45:29 localhost systemd[4180]: Reached target Main User Target. Oct 11 02:45:29 localhost systemd[4180]: Startup finished in 121ms. Oct 11 02:45:29 localhost systemd[1]: Started User Manager for UID 1000. Oct 11 02:45:29 localhost systemd[1]: Started Session 1 of User zuul. Oct 11 02:45:30 localhost python3[4232]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 02:45:38 localhost python3[4250]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 02:45:47 localhost python3[4303]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 02:45:48 localhost python3[4333]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Oct 11 02:45:51 localhost python3[4349]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:45:52 localhost python3[4363]: ansible-file Invoked with state=directory path=/home/zuul/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:45:53 localhost python3[4422]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 02:45:53 localhost python3[4463]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1760165152.8171058-346-30139188478673/source dest=/home/zuul/.ssh/id_rsa mode=384 force=False _original_basename=773efae287264645b4a175fdf713baba_id_rsa follow=False checksum=e8c66a546e1cd2389f230b7be312477b2102af5f backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:45:54 localhost python3[4536]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 02:45:55 localhost python3[4577]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1760165154.5112448-445-129711077789630/source dest=/home/zuul/.ssh/id_rsa.pub mode=420 force=False _original_basename=773efae287264645b4a175fdf713baba_id_rsa.pub follow=False checksum=86e34779490989b3e11d49cf21170e08dc5e60da backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:45:57 localhost python3[4605]: ansible-ping Invoked with data=pong Oct 11 02:45:59 localhost python3[4619]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 02:46:03 localhost python3[4672]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Oct 11 02:46:05 localhost python3[4694]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:05 localhost python3[4708]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:05 localhost python3[4722]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:07 localhost python3[4736]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:07 localhost python3[4750]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:07 localhost python3[4764]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:10 localhost python3[4781]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:11 localhost python3[4829]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 02:46:12 localhost python3[4872]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul/.ansible/tmp/ansible-tmp-1760165171.2707756-59-163563820051368/source follow=False _original_basename=mirror_info.sh.j2 checksum=92d92a03afdddee82732741071f662c729080c35 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:13 localhost python3[4900]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA4Z/c9osaGGtU6X8fgELwfj/yayRurfcKA0HMFfdpPxev2dbwljysMuzoVp4OZmW1gvGtyYPSNRvnzgsaabPNKNo2ym5NToCP6UM+KSe93aln4BcM/24mXChYAbXJQ5Bqq/pIzsGs/pKetQN+vwvMxLOwTvpcsCJBXaa981RKML6xj9l/UZ7IIq1HSEKMvPLxZMWdu0Ut8DkCd5F4nOw9Wgml2uYpDCj5LLCrQQ9ChdOMz8hz6SighhNlRpPkvPaet3OXxr/ytFMu7j7vv06CaEnuMMiY2aTWN1Imin9eHAylIqFHta/3gFfQSWt9jXM7owkBLKL7ATzhaAn+fjNupw== arxcruz@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:13 localhost python3[4914]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDS4Fn6k4deCnIlOtLWqZJyksbepjQt04j8Ed8CGx9EKkj0fKiAxiI4TadXQYPuNHMixZy4Nevjb6aDhL5Z906TfvNHKUrjrG7G26a0k8vdc61NEQ7FmcGMWRLwwc6ReDO7lFpzYKBMk4YqfWgBuGU/K6WLKiVW2cVvwIuGIaYrE1OiiX0iVUUk7KApXlDJMXn7qjSYynfO4mF629NIp8FJal38+Kv+HA+0QkE5Y2xXnzD4Lar5+keymiCHRntPppXHeLIRzbt0gxC7v3L72hpQ3BTBEzwHpeS8KY+SX1y5lRMN45thCHfJqGmARJREDjBvWG8JXOPmVIKQtZmVcD5b mandreou@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:14 localhost python3[4928]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9MiLfy30deHA7xPOAlew5qUq3UP2gmRMYJi8PtkjFB20/DKeWwWNnkZPqP9AayruRoo51SIiVg870gbZE2jYl+Ncx/FYDe56JeC3ySZsXoAVkC9bP7gkOGqOmJjirvAgPMI7bogVz8i+66Q4Ar7OKTp3762G4IuWPPEg4ce4Y7lx9qWocZapHYq4cYKMxrOZ7SEbFSATBbe2bPZAPKTw8do/Eny+Hq/LkHFhIeyra6cqTFQYShr+zPln0Cr+ro/pDX3bB+1ubFgTpjpkkkQsLhDfR6cCdCWM2lgnS3BTtYj5Ct9/JRPR5YOphqZz+uB+OEu2IL68hmU9vNTth1KeX rlandy@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:14 localhost python3[4942]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFCbgz8gdERiJlk2IKOtkjQxEXejrio6ZYMJAVJYpOIp raukadah@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:14 localhost python3[4956]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBqb3Q/9uDf4LmihQ7xeJ9gA/STIQUFPSfyyV0m8AoQi bshewale@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:14 localhost python3[4970]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0I8QqQx0Az2ysJt2JuffucLijhBqnsXKEIx5GyHwxVULROa8VtNFXUDH6ZKZavhiMcmfHB2+TBTda+lDP4FldYj06dGmzCY+IYGa+uDRdxHNGYjvCfLFcmLlzRK6fNbTcui+KlUFUdKe0fb9CRoGKyhlJD5GRkM1Dv+Yb6Bj+RNnmm1fVGYxzmrD2utvffYEb0SZGWxq2R9gefx1q/3wCGjeqvufEV+AskPhVGc5T7t9eyZ4qmslkLh1/nMuaIBFcr9AUACRajsvk6mXrAN1g3HlBf2gQlhi1UEyfbqIQvzzFtsbLDlSum/KmKjy818GzvWjERfQ0VkGzCd9bSLVL dviroel@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:15 localhost python3[4984]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 anbanerj@kaermorhen manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:15 localhost python3[4998]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 dasm@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:15 localhost python3[5012]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHUnwjB20UKmsSed9X73eGNV5AOEFccQ3NYrRW776pEk cjeanner manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:15 localhost python3[5026]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDercCMGn8rW1C4P67tHgtflPdTeXlpyUJYH+6XDd2lR jgilaber@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:16 localhost python3[5040]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAMI6kkg9Wg0sG7jIJmyZemEBwUn1yzNpQQd3gnulOmZ adrianfuscoarnejo@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:16 localhost python3[5054]: ansible-authorized_key Invoked with user=zuul state=present key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPijwpQu/3jhhhBZInXNOLEH57DrknPc3PLbsRvYyJIFzwYjX+WD4a7+nGnMYS42MuZk6TJcVqgnqofVx4isoD4= ramishra@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:16 localhost python3[5068]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGpU/BepK3qX0NRf5Np+dOBDqzQEefhNrw2DCZaH3uWW rebtoor@monolith manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:16 localhost python3[5082]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDK0iKdi8jQTpQrDdLVH/AAgLVYyTXF7AQ1gjc/5uT3t ykarel@yatinkarel manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:17 localhost python3[5096]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF/V/cLotA6LZeO32VL45Hd78skuA2lJA425Sm2LlQeZ fmount@horcrux manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:17 localhost python3[5110]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDa7QCjuDMVmRPo1rREbGwzYeBCYVN+Ou/3WKXZEC6Sr manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:17 localhost python3[5124]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 averdagu@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:17 localhost python3[5138]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 ashigupt@ashigupt.remote.csb manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:18 localhost python3[5152]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOKLl0NYKwoZ/JY5KeZU8VwRAggeOxqQJeoqp3dsAaY9 manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:18 localhost python3[5166]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIASASQOH2BcOyLKuuDOdWZlPi2orcjcA8q4400T73DLH evallesp@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:18 localhost python3[5180]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILeBWlamUph+jRKV2qrx1PGU7vWuGIt5+z9k96I8WehW amsinha@amsinha-mac manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:19 localhost python3[5194]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIANvVgvJBlK3gb1yz5uef/JqIGq4HLEmY2dYA8e37swb morenod@redhat-laptop manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:19 localhost python3[5208]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 brjackma@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:19 localhost python3[5222]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKwedoZ0TWPJX/z/4TAbO/kKcDZOQVgRH0hAqrL5UCI1 vcastell@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:19 localhost python3[5236]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEmv8sE8GCk6ZTPIqF0FQrttBdL3mq7rCm/IJy0xDFh7 michburk@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:20 localhost python3[5250]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICy6GpGEtwevXEEn4mmLR5lmSLe23dGgAvzkB9DMNbkf rsafrono@rsafrono manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 02:46:28 localhost python3[5266]: ansible-community.general.timezone Invoked with name=UTC hwclock=None Oct 11 02:46:28 localhost systemd[1]: Starting Time & Date Service... Oct 11 02:46:28 localhost systemd[1]: Started Time & Date Service. Oct 11 02:46:28 localhost systemd-timedated[5268]: Changed time zone to 'UTC' (UTC). Oct 11 02:46:30 localhost python3[5287]: ansible-file Invoked with path=/etc/nodepool state=directory mode=511 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:31 localhost python3[5333]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 02:46:31 localhost python3[5374]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes src=/home/zuul/.ansible/tmp/ansible-tmp-1760165190.8864498-455-252137370182182/source _original_basename=tmp4itkqd3i follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:32 localhost python3[5434]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 02:46:32 localhost python3[5475]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes_private src=/home/zuul/.ansible/tmp/ansible-tmp-1760165192.3387349-544-188011002448704/source _original_basename=tmp4ufh07et follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:34 localhost python3[5537]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 02:46:35 localhost python3[5580]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/node_private src=/home/zuul/.ansible/tmp/ansible-tmp-1760165194.5555332-688-117724985726292/source _original_basename=tmpedxzlznx follow=False checksum=2e193f101b911db5e638a5fc33120ba1c99c8f88 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:36 localhost python3[5608]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa /etc/nodepool/id_rsa zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:46:36 localhost python3[5624]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa.pub /etc/nodepool/id_rsa.pub zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:46:37 localhost python3[5674]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/zuul-sudo-grep follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 02:46:38 localhost python3[5717]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/zuul-sudo-grep mode=288 src=/home/zuul/.ansible/tmp/ansible-tmp-1760165197.5857973-815-187835095091403/source _original_basename=tmpnm7d7w1k follow=False checksum=bdca1a77493d00fb51567671791f4aa30f66c2f0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:39 localhost python3[5748]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/visudo -c zuul_log_id=fa163ec2-ffbe-125c-55c6-000000000023-1-overcloudcontroller2 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:46:40 localhost python3[5766]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=env#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-125c-55c6-000000000024-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Oct 11 02:46:43 localhost python3[5784]: ansible-file Invoked with path=/home/zuul/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:46:58 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Oct 11 02:47:03 localhost python3[5804]: ansible-ansible.builtin.file Invoked with path=/etc/ci/env state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:47:10 localhost sshd[5805]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:47:25 localhost sshd[5806]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:47:25 localhost sshd[5808]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:47:25 localhost sshd[5809]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:47:25 localhost sshd[5810]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:47:25 localhost sshd[5807]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:47:25 localhost sshd[5811]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:47:25 localhost sshd[5814]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:47:25 localhost sshd[5816]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:47:25 localhost sshd[5818]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:47:25 localhost sshd[5820]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:47:25 localhost sshd[5822]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:47:25 localhost sshd[5824]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:48:03 localhost systemd-logind[763]: Session 1 logged out. Waiting for processes to exit. Oct 11 02:48:22 localhost systemd[4180]: Starting Mark boot as successful... Oct 11 02:48:22 localhost systemd[4180]: Finished Mark boot as successful. Oct 11 02:48:49 localhost systemd[1]: Unmounting EFI System Partition Automount... Oct 11 02:48:49 localhost systemd[1]: efi.mount: Deactivated successfully. Oct 11 02:48:49 localhost systemd[1]: Unmounted EFI System Partition Automount. Oct 11 02:49:48 localhost kernel: pci 0000:00:07.0: [1af4:1000] type 00 class 0x020000 Oct 11 02:49:48 localhost kernel: pci 0000:00:07.0: reg 0x10: [io 0x0000-0x003f] Oct 11 02:49:48 localhost kernel: pci 0000:00:07.0: reg 0x14: [mem 0x00000000-0x00000fff] Oct 11 02:49:48 localhost kernel: pci 0000:00:07.0: reg 0x20: [mem 0x00000000-0x00003fff 64bit pref] Oct 11 02:49:48 localhost kernel: pci 0000:00:07.0: reg 0x30: [mem 0x00000000-0x0007ffff pref] Oct 11 02:49:48 localhost kernel: pci 0000:00:07.0: BAR 6: assigned [mem 0xc0000000-0xc007ffff pref] Oct 11 02:49:48 localhost kernel: pci 0000:00:07.0: BAR 4: assigned [mem 0x440000000-0x440003fff 64bit pref] Oct 11 02:49:48 localhost kernel: pci 0000:00:07.0: BAR 1: assigned [mem 0xc0080000-0xc0080fff] Oct 11 02:49:48 localhost kernel: pci 0000:00:07.0: BAR 0: assigned [io 0x1000-0x103f] Oct 11 02:49:48 localhost kernel: virtio-pci 0000:00:07.0: enabling device (0000 -> 0003) Oct 11 02:49:48 localhost NetworkManager[788]: [1760165388.9019] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Oct 11 02:49:48 localhost systemd-udevd[5832]: Network interface NamePolicy= disabled on kernel command line. Oct 11 02:49:48 localhost NetworkManager[788]: [1760165388.9164] device (eth1): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Oct 11 02:49:48 localhost NetworkManager[788]: [1760165388.9194] settings: (eth1): created default wired connection 'Wired connection 1' Oct 11 02:49:48 localhost NetworkManager[788]: [1760165388.9198] device (eth1): carrier: link connected Oct 11 02:49:48 localhost NetworkManager[788]: [1760165388.9201] device (eth1): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Oct 11 02:49:48 localhost NetworkManager[788]: [1760165388.9207] policy: auto-activating connection 'Wired connection 1' (a5883a24-e8a5-3256-ac1b-221c68bc03d2) Oct 11 02:49:48 localhost NetworkManager[788]: [1760165388.9214] device (eth1): Activation: starting connection 'Wired connection 1' (a5883a24-e8a5-3256-ac1b-221c68bc03d2) Oct 11 02:49:48 localhost NetworkManager[788]: [1760165388.9215] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Oct 11 02:49:48 localhost NetworkManager[788]: [1760165388.9219] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Oct 11 02:49:48 localhost NetworkManager[788]: [1760165388.9226] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Oct 11 02:49:48 localhost NetworkManager[788]: [1760165388.9230] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Oct 11 02:49:49 localhost sshd[5834]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:49:49 localhost systemd-logind[763]: New session 3 of user zuul. Oct 11 02:49:49 localhost systemd[1]: Started Session 3 of User zuul. Oct 11 02:49:49 localhost python3[5851]: ansible-ansible.legacy.command Invoked with _raw_params=ip -j link zuul_log_id=fa163ec2-ffbe-467a-4b75-00000000032e-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:49:49 localhost kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready Oct 11 02:50:02 localhost python3[5901]: ansible-ansible.legacy.stat Invoked with path=/etc/NetworkManager/system-connections/ci-private-network.nmconnection follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 02:50:03 localhost python3[5944]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1760165402.6667814-384-125338985364215/source dest=/etc/NetworkManager/system-connections/ci-private-network.nmconnection mode=0600 owner=root group=root follow=False _original_basename=bootstrap-ci-network-nm-connection.nmconnection.j2 checksum=ec31085df4ce5fd1703d840b1ebd136dbc712aa7 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:50:03 localhost python3[5974]: ansible-ansible.builtin.systemd Invoked with name=NetworkManager state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 02:50:04 localhost systemd[1]: NetworkManager-wait-online.service: Deactivated successfully. Oct 11 02:50:04 localhost systemd[1]: Stopped Network Manager Wait Online. Oct 11 02:50:04 localhost systemd[1]: Stopping Network Manager Wait Online... Oct 11 02:50:04 localhost systemd[1]: Stopping Network Manager... Oct 11 02:50:04 localhost NetworkManager[788]: [1760165404.9231] caught SIGTERM, shutting down normally. Oct 11 02:50:04 localhost NetworkManager[788]: [1760165404.9295] dhcp4 (eth0): canceled DHCP transaction Oct 11 02:50:04 localhost NetworkManager[788]: [1760165404.9296] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Oct 11 02:50:04 localhost NetworkManager[788]: [1760165404.9296] dhcp4 (eth0): state changed no lease Oct 11 02:50:04 localhost NetworkManager[788]: [1760165404.9299] manager: NetworkManager state is now CONNECTING Oct 11 02:50:04 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Oct 11 02:50:04 localhost NetworkManager[788]: [1760165404.9386] dhcp4 (eth1): canceled DHCP transaction Oct 11 02:50:04 localhost NetworkManager[788]: [1760165404.9386] dhcp4 (eth1): state changed no lease Oct 11 02:50:04 localhost NetworkManager[788]: [1760165404.9462] exiting (success) Oct 11 02:50:04 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Oct 11 02:50:04 localhost systemd[1]: NetworkManager.service: Deactivated successfully. Oct 11 02:50:04 localhost systemd[1]: Stopped Network Manager. Oct 11 02:50:04 localhost systemd[1]: NetworkManager.service: Consumed 1.417s CPU time. Oct 11 02:50:04 localhost systemd[1]: Starting Network Manager... Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.0049] NetworkManager (version 1.42.2-1.el9) is starting... (after a restart, boot:6b3aa2b3-4af4-42d1-8b95-0a2ae6501f29) Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.0051] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.0074] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Oct 11 02:50:05 localhost systemd[1]: Started Network Manager. Oct 11 02:50:05 localhost systemd[1]: Starting Network Manager Wait Online... Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.0127] manager[0x55a12fe89090]: monitoring kernel firmware directory '/lib/firmware'. Oct 11 02:50:05 localhost systemd[1]: Starting Hostname Service... Oct 11 02:50:05 localhost systemd[1]: Started Hostname Service. Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.0915] hostname: hostname: using hostnamed Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.0916] hostname: static hostname changed from (none) to "np0005481015.novalocal" Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.0922] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.0929] manager[0x55a12fe89090]: rfkill: Wi-Fi hardware radio set enabled Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.0929] manager[0x55a12fe89090]: rfkill: WWAN hardware radio set enabled Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.0968] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.0969] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.0969] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.0970] manager: Networking is enabled by state file Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.0977] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.0977] settings: Loaded settings plugin: keyfile (internal) Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1025] dhcp: init: Using DHCP client 'internal' Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1030] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1036] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1043] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1056] device (lo): Activation: starting connection 'lo' (74d3bfab-7353-4e3e-8e40-408d23166cb2) Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1064] device (eth0): carrier: link connected Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1070] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1078] manager: (eth0): assume: will attempt to assume matching connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) (indicated) Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1079] device (eth0): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1089] device (eth0): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1098] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1106] device (eth1): carrier: link connected Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1112] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1120] manager: (eth1): assume: will attempt to assume matching connection 'Wired connection 1' (a5883a24-e8a5-3256-ac1b-221c68bc03d2) (indicated) Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1121] device (eth1): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1128] device (eth1): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1138] device (eth1): Activation: starting connection 'Wired connection 1' (a5883a24-e8a5-3256-ac1b-221c68bc03d2) Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1165] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1171] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1175] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1178] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1182] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1184] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1189] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1192] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1200] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1204] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1215] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1218] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1254] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1261] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1269] device (lo): Activation: successful, device activated. Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1278] dhcp4 (eth0): state changed new lease, address=38.102.83.132 Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1284] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1376] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1437] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1440] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1445] manager: NetworkManager state is now CONNECTED_SITE Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1450] device (eth0): Activation: successful, device activated. Oct 11 02:50:05 localhost NetworkManager[5989]: [1760165405.1455] manager: NetworkManager state is now CONNECTED_GLOBAL Oct 11 02:50:05 localhost python3[6051]: ansible-ansible.legacy.command Invoked with _raw_params=ip route zuul_log_id=fa163ec2-ffbe-467a-4b75-000000000115-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:50:15 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Oct 11 02:50:35 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 11 02:50:50 localhost NetworkManager[5989]: [1760165450.8000] device (eth1): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Oct 11 02:50:50 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Oct 11 02:50:50 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Oct 11 02:50:50 localhost NetworkManager[5989]: [1760165450.8224] device (eth1): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Oct 11 02:50:50 localhost NetworkManager[5989]: [1760165450.8229] device (eth1): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Oct 11 02:50:50 localhost NetworkManager[5989]: [1760165450.8238] device (eth1): Activation: successful, device activated. Oct 11 02:50:50 localhost NetworkManager[5989]: [1760165450.8244] manager: startup complete Oct 11 02:50:50 localhost systemd[1]: Finished Network Manager Wait Online. Oct 11 02:51:00 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Oct 11 02:51:05 localhost systemd[1]: session-3.scope: Deactivated successfully. Oct 11 02:51:05 localhost systemd[1]: session-3.scope: Consumed 1.451s CPU time. Oct 11 02:51:05 localhost systemd-logind[763]: Session 3 logged out. Waiting for processes to exit. Oct 11 02:51:05 localhost systemd-logind[763]: Removed session 3. Oct 11 02:51:22 localhost systemd[4180]: Created slice User Background Tasks Slice. Oct 11 02:51:22 localhost systemd[4180]: Starting Cleanup of User's Temporary Files and Directories... Oct 11 02:51:22 localhost systemd[4180]: Finished Cleanup of User's Temporary Files and Directories. Oct 11 02:52:39 localhost sshd[6076]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:52:39 localhost systemd-logind[763]: New session 4 of user zuul. Oct 11 02:52:39 localhost systemd[1]: Started Session 4 of User zuul. Oct 11 02:52:40 localhost python3[6127]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/env/networking-info.yml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 02:52:40 localhost python3[6170]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/env/networking-info.yml owner=root group=root mode=0644 src=/home/zuul/.ansible/tmp/ansible-tmp-1760165560.0644078-628-158717827433309/source _original_basename=tmpjud4k15x follow=False checksum=d72dfb4b8a7a438c1089af014d37b6019c0dea8e backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:52:46 localhost systemd[1]: session-4.scope: Deactivated successfully. Oct 11 02:52:46 localhost systemd-logind[763]: Session 4 logged out. Waiting for processes to exit. Oct 11 02:52:46 localhost systemd-logind[763]: Removed session 4. Oct 11 02:58:39 localhost sshd[6188]: main: sshd: ssh-rsa algorithm is disabled Oct 11 02:58:39 localhost systemd-logind[763]: New session 5 of user zuul. Oct 11 02:58:39 localhost systemd[1]: Started Session 5 of User zuul. Oct 11 02:58:39 localhost python3[6207]: ansible-ansible.legacy.command Invoked with _raw_params=lsblk -nd -o MAJ:MIN /dev/vda#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-9394-e238-000000001d22-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:58:41 localhost python3[6226]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/init.scope state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:58:41 localhost python3[6242]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/machine.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:58:41 localhost python3[6258]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/system.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:58:42 localhost python3[6274]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/user.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:58:43 localhost python3[6290]: ansible-ansible.builtin.lineinfile Invoked with path=/etc/systemd/system.conf regexp=^#DefaultIOAccounting=no line=DefaultIOAccounting=yes state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 02:58:43 localhost python3[6290]: ansible-ansible.builtin.lineinfile [WARNING] Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually Oct 11 02:58:44 localhost python3[6306]: ansible-ansible.builtin.systemd_service Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Oct 11 02:58:44 localhost systemd[1]: Reloading. Oct 11 02:58:44 localhost systemd-rc-local-generator[6323]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 02:58:44 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 02:58:46 localhost python3[6352]: ansible-ansible.builtin.wait_for Invoked with path=/sys/fs/cgroup/system.slice/io.max state=present timeout=30 host=127.0.0.1 connect_timeout=5 delay=0 active_connection_states=['ESTABLISHED', 'FIN_WAIT1', 'FIN_WAIT2', 'SYN_RECV', 'SYN_SENT', 'TIME_WAIT'] sleep=1 port=None search_regex=None exclude_hosts=None msg=None Oct 11 02:58:47 localhost python3[6368]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/init.scope/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:58:47 localhost python3[6386]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/machine.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:58:47 localhost python3[6404]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/system.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:58:47 localhost python3[6422]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/user.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:58:49 localhost python3[6439]: ansible-ansible.legacy.command Invoked with _raw_params=echo "init"; cat /sys/fs/cgroup/init.scope/io.max; echo "machine"; cat /sys/fs/cgroup/machine.slice/io.max; echo "system"; cat /sys/fs/cgroup/system.slice/io.max; echo "user"; cat /sys/fs/cgroup/user.slice/io.max;#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-9394-e238-000000001d28-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 02:58:50 localhost python3[6459]: ansible-ansible.builtin.stat Invoked with path=/sys/fs/cgroup/kubepods.slice/io.max follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 02:58:53 localhost systemd-logind[763]: Session 5 logged out. Waiting for processes to exit. Oct 11 02:58:53 localhost systemd[1]: session-5.scope: Deactivated successfully. Oct 11 02:58:53 localhost systemd[1]: session-5.scope: Consumed 3.193s CPU time. Oct 11 02:58:53 localhost systemd-logind[763]: Removed session 5. Oct 11 03:00:08 localhost sshd[6465]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:00:08 localhost systemd[1]: Starting Cleanup of Temporary Directories... Oct 11 03:00:08 localhost systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Oct 11 03:00:08 localhost systemd[1]: Finished Cleanup of Temporary Directories. Oct 11 03:00:08 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Oct 11 03:00:08 localhost systemd-logind[763]: New session 6 of user zuul. Oct 11 03:00:08 localhost systemd[1]: Started Session 6 of User zuul. Oct 11 03:00:09 localhost systemd[1]: Starting RHSM dbus service... Oct 11 03:00:09 localhost systemd[1]: Started RHSM dbus service. Oct 11 03:00:09 localhost rhsm-service[6492]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Oct 11 03:00:09 localhost rhsm-service[6492]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Oct 11 03:00:09 localhost rhsm-service[6492]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Oct 11 03:00:09 localhost rhsm-service[6492]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Oct 11 03:00:23 localhost rhsm-service[6492]: INFO [subscription_manager.managerlib:90] Consumer created: np0005481015.novalocal (a2e47a36-fc43-459c-a93c-b0436366d6ee) Oct 11 03:00:23 localhost subscription-manager[6492]: Registered system with identity: a2e47a36-fc43-459c-a93c-b0436366d6ee Oct 11 03:00:31 localhost rhsm-service[6492]: INFO [subscription_manager.entcertlib:131] certs updated: Oct 11 03:00:31 localhost rhsm-service[6492]: Total updates: 1 Oct 11 03:00:31 localhost rhsm-service[6492]: Found (local) serial# [] Oct 11 03:00:31 localhost rhsm-service[6492]: Expected (UEP) serial# [2329395824544128530] Oct 11 03:00:31 localhost rhsm-service[6492]: Added (new) Oct 11 03:00:31 localhost rhsm-service[6492]: [sn:2329395824544128530 ( Content Access,) @ /etc/pki/entitlement/2329395824544128530.pem] Oct 11 03:00:31 localhost rhsm-service[6492]: Deleted (rogue): Oct 11 03:00:31 localhost rhsm-service[6492]: Oct 11 03:00:31 localhost subscription-manager[6492]: Added subscription for 'Content Access' contract 'None' Oct 11 03:00:31 localhost subscription-manager[6492]: Added subscription for product ' Content Access' Oct 11 03:00:45 localhost rhsm-service[6492]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Oct 11 03:00:45 localhost rhsm-service[6492]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Oct 11 03:00:45 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:00:46 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:00:47 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:00:48 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:00:48 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:00:58 localhost python3[6584]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163ec2-ffbe-f08f-490e-00000000000d-1-overcloudcontroller2 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:00:59 localhost python3[6603]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 03:01:30 localhost setsebool[6693]: The virt_use_nfs policy boolean was changed to 1 by root Oct 11 03:01:30 localhost setsebool[6693]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Oct 11 03:01:40 localhost kernel: SELinux: Converting 408 SID table entries... Oct 11 03:01:40 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 03:01:40 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 03:01:40 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 03:01:40 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 03:01:40 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 03:01:40 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 03:01:40 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 03:01:53 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=3 res=1 Oct 11 03:01:53 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 11 03:01:53 localhost systemd[1]: Starting man-db-cache-update.service... Oct 11 03:01:53 localhost systemd[1]: Reloading. Oct 11 03:01:53 localhost systemd-rc-local-generator[7550]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:01:53 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:01:53 localhost systemd[1]: Queuing reload/restart jobs for marked units… Oct 11 03:01:54 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:01:54 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:02:02 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 11 03:02:02 localhost systemd[1]: Finished man-db-cache-update.service. Oct 11 03:02:02 localhost systemd[1]: man-db-cache-update.service: Consumed 10.956s CPU time. Oct 11 03:02:02 localhost systemd[1]: run-r4b8ab942aa3743cf90726b27f28fb172.service: Deactivated successfully. Oct 11 03:02:46 localhost systemd[1]: var-lib-containers-storage-overlay-metacopy\x2dcheck767978481-merged.mount: Deactivated successfully. Oct 11 03:02:46 localhost podman[18286]: 2025-10-11 07:02:46.108778653 +0000 UTC m=+0.106550761 system refresh Oct 11 03:02:46 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 03:02:46 localhost systemd[4180]: Starting D-Bus User Message Bus... Oct 11 03:02:46 localhost dbus-broker-launch[18343]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Oct 11 03:02:46 localhost dbus-broker-launch[18343]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Oct 11 03:02:46 localhost systemd[4180]: Started D-Bus User Message Bus. Oct 11 03:02:46 localhost journal[18343]: Ready Oct 11 03:02:46 localhost systemd[4180]: selinux: avc: op=load_policy lsm=selinux seqno=3 res=1 Oct 11 03:02:46 localhost systemd[4180]: Created slice Slice /user. Oct 11 03:02:46 localhost systemd[4180]: podman-18326.scope: unit configures an IP firewall, but not running as root. Oct 11 03:02:46 localhost systemd[4180]: (This warning is only shown for the first unit using IP firewalling.) Oct 11 03:02:46 localhost systemd[4180]: Started podman-18326.scope. Oct 11 03:02:47 localhost systemd[4180]: Started podman-pause-c3b5644f.scope. Oct 11 03:02:49 localhost systemd[1]: session-6.scope: Deactivated successfully. Oct 11 03:02:49 localhost systemd[1]: session-6.scope: Consumed 52.254s CPU time. Oct 11 03:02:49 localhost systemd-logind[763]: Session 6 logged out. Waiting for processes to exit. Oct 11 03:02:49 localhost systemd-logind[763]: Removed session 6. Oct 11 03:03:03 localhost sshd[18348]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:03:03 localhost sshd[18349]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:03:03 localhost sshd[18351]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:03:03 localhost sshd[18350]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:03:03 localhost sshd[18352]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:03:09 localhost sshd[18358]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:03:09 localhost systemd-logind[763]: New session 7 of user zuul. Oct 11 03:03:09 localhost systemd[1]: Started Session 7 of User zuul. Oct 11 03:03:09 localhost python3[18375]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI2AlTQJ+Rt4b+W3cmkamiGed/TWINztiREldQ6kk+w1aihiJeOpTyOudk23srWqhRTljFZtZSodkbyWCFW716w= zuul@np0005481009.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 03:03:10 localhost python3[18391]: ansible-ansible.posix.authorized_key Invoked with user=root key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI2AlTQJ+Rt4b+W3cmkamiGed/TWINztiREldQ6kk+w1aihiJeOpTyOudk23srWqhRTljFZtZSodkbyWCFW716w= zuul@np0005481009.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 03:03:12 localhost systemd[1]: session-7.scope: Deactivated successfully. Oct 11 03:03:12 localhost systemd-logind[763]: Session 7 logged out. Waiting for processes to exit. Oct 11 03:03:12 localhost systemd-logind[763]: Removed session 7. Oct 11 03:04:39 localhost sshd[18393]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:04:39 localhost systemd-logind[763]: New session 8 of user zuul. Oct 11 03:04:39 localhost systemd[1]: Started Session 8 of User zuul. Oct 11 03:04:40 localhost python3[18412]: ansible-authorized_key Invoked with user=root manage_dir=True key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDXQrx6pLIxXoqpQGqRzt17OwBjD4PLZmfi63TVurUZvJVIZMGvBcxTuHapVdQCfxX0TONIHAe+K14GwtUpdHhJDNyTpnkPpL10is+RNMJP1asVCNq7lbbfWyXm6HjNXNdXLsGkvsfO98JwqwtRI1cYvsPrksXJVusq2XjxibHuDPvIUrQpad8Ayk8NQ/PMIQVZTQgik6WvBAf7stc8A8A4lmCt8s1gOPtBh+se5FWwvl5m2SN9F6kat/G+kYLYQ34UQx1hzLrNJg0CL/x19YJoMoKZyKQxKkvI0yHyIeHMyOwBV0L6ISlNieeEYM1Kts+fX9qNv3kRt3muJ0PpnvXTRJzetE6paWdcEtKyFGTqptuuFD0KbmWuk+clN193JABT2KuQot1MbzbaxQSZZRSVcFLJDrFkhRp//mNW3y5b2e2172hG8xnKraakOcM579snTc8wJe5sIvNzvRl6+gcoiOPZI7cCcQmqcX5hLK9GmLSwbaxNne0a3Pnt73a9aTk= zuul-build-sshkey state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 03:04:41 localhost python3[18428]: ansible-user Invoked with name=root state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005481015.novalocal update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Oct 11 03:04:42 localhost python3[18478]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:04:42 localhost python3[18521]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1760166281.8196902-92-251471811619550/source dest=/root/.ssh/id_rsa mode=384 owner=root force=False _original_basename=773efae287264645b4a175fdf713baba_id_rsa follow=False checksum=e8c66a546e1cd2389f230b7be312477b2102af5f backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:04:44 localhost python3[18583]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:04:44 localhost python3[18626]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1760166283.7502513-183-36442040417555/source dest=/root/.ssh/id_rsa.pub mode=420 owner=root force=False _original_basename=773efae287264645b4a175fdf713baba_id_rsa.pub follow=False checksum=86e34779490989b3e11d49cf21170e08dc5e60da backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:04:47 localhost python3[18656]: ansible-ansible.builtin.file Invoked with path=/etc/nodepool state=directory mode=0777 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:04:47 localhost python3[18702]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:04:48 localhost python3[18718]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes _original_basename=tmpw0c3u5mm recurse=False state=file path=/etc/nodepool/sub_nodes force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:04:49 localhost python3[18778]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:04:49 localhost python3[18794]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes_private _original_basename=tmpjxt_1b6e recurse=False state=file path=/etc/nodepool/sub_nodes_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:04:50 localhost python3[18854]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:04:51 localhost python3[18870]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/node_private _original_basename=tmp66yaj4yk recurse=False state=file path=/etc/nodepool/node_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:04:52 localhost systemd[1]: session-8.scope: Deactivated successfully. Oct 11 03:04:52 localhost systemd[1]: session-8.scope: Consumed 3.499s CPU time. Oct 11 03:04:52 localhost systemd-logind[763]: Session 8 logged out. Waiting for processes to exit. Oct 11 03:04:52 localhost systemd-logind[763]: Removed session 8. Oct 11 03:07:02 localhost sshd[18887]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:07:02 localhost systemd-logind[763]: New session 9 of user zuul. Oct 11 03:07:02 localhost systemd[1]: Started Session 9 of User zuul. Oct 11 03:07:02 localhost python3[18933]: ansible-ansible.legacy.command Invoked with _raw_params=hostname _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:12:02 localhost systemd[1]: session-9.scope: Deactivated successfully. Oct 11 03:12:02 localhost systemd-logind[763]: Session 9 logged out. Waiting for processes to exit. Oct 11 03:12:02 localhost systemd-logind[763]: Removed session 9. Oct 11 03:17:47 localhost sshd[18943]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:17:47 localhost systemd-logind[763]: New session 10 of user zuul. Oct 11 03:17:47 localhost systemd[1]: Started Session 10 of User zuul. Oct 11 03:17:47 localhost python3[18960]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163ec2-ffbe-1145-62ad-00000000000c-1-overcloudcontroller2 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:17:49 localhost python3[18980]: ansible-ansible.legacy.command Invoked with _raw_params=yum clean all zuul_log_id=fa163ec2-ffbe-1145-62ad-00000000000d-1-overcloudcontroller2 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:17:54 localhost python3[18999]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-baseos-eus-rpms'] state=enabled purge=False Oct 11 03:17:57 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:17:57 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:18:16 localhost sshd[19142]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:18:50 localhost python3[19159]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-appstream-eus-rpms'] state=enabled purge=False Oct 11 03:18:53 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:18:53 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:19:01 localhost python3[19359]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-highavailability-eus-rpms'] state=enabled purge=False Oct 11 03:19:05 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:19:05 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:19:10 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:19:10 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:19:34 localhost python3[19636]: ansible-community.general.rhsm_repository Invoked with name=['fast-datapath-for-rhel-9-x86_64-rpms'] state=enabled purge=False Oct 11 03:19:37 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:19:37 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:19:44 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:19:44 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:20:06 localhost python3[20031]: ansible-community.general.rhsm_repository Invoked with name=['openstack-17.1-for-rhel-9-x86_64-rpms'] state=enabled purge=False Oct 11 03:20:09 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:20:09 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:20:14 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:20:14 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:20:40 localhost python3[20428]: ansible-ansible.legacy.command Invoked with _raw_params=yum repolist --enabled#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-1145-62ad-000000000013-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:20:45 localhost python3[20447]: ansible-ansible.legacy.dnf Invoked with name=['openvswitch', 'os-net-config', 'ansible-core'] state=present update_cache=True allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 03:20:47 localhost sshd[20449]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:20:57 localhost systemd[1]: Started daily update of the root trust anchor for DNSSEC. Oct 11 03:21:05 localhost kernel: SELinux: Converting 500 SID table entries... Oct 11 03:21:05 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 03:21:05 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 03:21:05 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 03:21:05 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 03:21:05 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 03:21:05 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 03:21:05 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 03:21:09 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=4 res=1 Oct 11 03:21:09 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 11 03:21:09 localhost systemd[1]: Starting man-db-cache-update.service... Oct 11 03:21:09 localhost systemd[1]: Reloading. Oct 11 03:21:09 localhost systemd-rc-local-generator[21106]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:21:09 localhost systemd-sysv-generator[21111]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:21:09 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:21:09 localhost systemd[1]: Starting dnf makecache... Oct 11 03:21:09 localhost systemd[1]: Queuing reload/restart jobs for marked units… Oct 11 03:21:09 localhost dnf[21254]: Updating Subscription Management repositories. Oct 11 03:21:10 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 11 03:21:10 localhost systemd[1]: Finished man-db-cache-update.service. Oct 11 03:21:10 localhost systemd[1]: run-r2f90bea1b7374eabbbe74400728a661e.service: Deactivated successfully. Oct 11 03:21:11 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:21:11 localhost rhsm-service[6492]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Oct 11 03:21:11 localhost dnf[21254]: Failed determining last makecache time. Oct 11 03:21:11 localhost dnf[21254]: Red Hat Enterprise Linux 9 for x86_64 - High Av 33 kB/s | 4.0 kB 00:00 Oct 11 03:21:11 localhost dnf[21254]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 31 kB/s | 4.1 kB 00:00 Oct 11 03:21:11 localhost dnf[21254]: Red Hat OpenStack Platform 17.1 for RHEL 9 x86_ 30 kB/s | 4.0 kB 00:00 Oct 11 03:21:12 localhost dnf[21254]: Fast Datapath for RHEL 9 x86_64 (RPMs) 30 kB/s | 4.0 kB 00:00 Oct 11 03:21:12 localhost dnf[21254]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 33 kB/s | 4.5 kB 00:00 Oct 11 03:21:12 localhost dnf[21254]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 31 kB/s | 4.1 kB 00:00 Oct 11 03:21:12 localhost dnf[21254]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 34 kB/s | 4.5 kB 00:00 Oct 11 03:21:12 localhost dnf[21254]: Metadata cache created. Oct 11 03:21:13 localhost systemd[1]: dnf-makecache.service: Deactivated successfully. Oct 11 03:21:13 localhost systemd[1]: Finished dnf makecache. Oct 11 03:21:13 localhost systemd[1]: dnf-makecache.service: Consumed 2.572s CPU time. Oct 11 03:21:38 localhost python3[21686]: ansible-ansible.legacy.command Invoked with _raw_params=ansible-galaxy collection install ansible.posix#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-1145-62ad-000000000015-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:22:02 localhost python3[21706]: ansible-ansible.builtin.file Invoked with path=/etc/os-net-config state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:22:02 localhost python3[21754]: ansible-ansible.legacy.stat Invoked with path=/etc/os-net-config/tripleo_config.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:22:03 localhost python3[21797]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1760167322.5825996-289-32722597923248/source dest=/etc/os-net-config/tripleo_config.yaml mode=None follow=False _original_basename=overcloud_net_config.j2 checksum=aed8e312f8ee66e212b5f9a6cd551423fddc0577 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:22:04 localhost python3[21827]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Oct 11 03:22:04 localhost systemd-journald[617]: Field hash table of /run/log/journal/0d75598033f175d0e781a840bff83569/system.journal has a fill level at 91.6 (305 of 333 items), suggesting rotation. Oct 11 03:22:04 localhost systemd-journald[617]: /run/log/journal/0d75598033f175d0e781a840bff83569/system.journal: Journal header limits reached or header out-of-date, rotating. Oct 11 03:22:04 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 03:22:04 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 03:22:05 localhost python3[21848]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-20 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Oct 11 03:22:05 localhost python3[21868]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-21 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Oct 11 03:22:05 localhost python3[21888]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-22 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Oct 11 03:22:05 localhost python3[21908]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-23 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Oct 11 03:22:09 localhost python3[21928]: ansible-ansible.builtin.systemd Invoked with name=network state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 03:22:09 localhost systemd[1]: Starting LSB: Bring up/down networking... Oct 11 03:22:09 localhost network[21931]: WARN : [network] You are using 'network' service provided by 'network-scripts', which are now deprecated. Oct 11 03:22:09 localhost network[21942]: You are using 'network' service provided by 'network-scripts', which are now deprecated. Oct 11 03:22:09 localhost network[21931]: WARN : [network] 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:09 localhost network[21943]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:09 localhost network[21931]: WARN : [network] It is advised to switch to 'NetworkManager' instead for network management. Oct 11 03:22:09 localhost network[21944]: It is advised to switch to 'NetworkManager' instead for network management. Oct 11 03:22:09 localhost NetworkManager[5989]: [1760167329.4028] audit: op="connections-reload" pid=21972 uid=0 result="success" Oct 11 03:22:09 localhost network[21931]: Bringing up loopback interface: [ OK ] Oct 11 03:22:09 localhost NetworkManager[5989]: [1760167329.5995] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth0" pid=22060 uid=0 result="success" Oct 11 03:22:09 localhost network[21931]: Bringing up interface eth0: [ OK ] Oct 11 03:22:09 localhost systemd[1]: Started LSB: Bring up/down networking. Oct 11 03:22:10 localhost python3[22101]: ansible-ansible.builtin.systemd Invoked with name=openvswitch state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 03:22:10 localhost systemd[1]: Starting Open vSwitch Database Unit... Oct 11 03:22:10 localhost chown[22105]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Oct 11 03:22:10 localhost ovs-ctl[22110]: /etc/openvswitch/conf.db does not exist ... (warning). Oct 11 03:22:10 localhost ovs-ctl[22110]: Creating empty database /etc/openvswitch/conf.db [ OK ] Oct 11 03:22:10 localhost ovs-ctl[22110]: Starting ovsdb-server [ OK ] Oct 11 03:22:10 localhost ovs-vsctl[22159]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.5.1 Oct 11 03:22:10 localhost ovs-vsctl[22179]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.3.5-110.el9fdp "external-ids:system-id=\"f05644ea-5271-4d86-9323-4f54f63226fd\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"rhel\"" "system-version=\"9.2\"" Oct 11 03:22:10 localhost ovs-ctl[22110]: Configuring Open vSwitch system IDs [ OK ] Oct 11 03:22:10 localhost ovs-ctl[22110]: Enabling remote OVSDB managers [ OK ] Oct 11 03:22:10 localhost systemd[1]: Started Open vSwitch Database Unit. Oct 11 03:22:10 localhost ovs-vsctl[22185]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005481015.novalocal Oct 11 03:22:10 localhost systemd[1]: Starting Open vSwitch Delete Transient Ports... Oct 11 03:22:10 localhost systemd[1]: Finished Open vSwitch Delete Transient Ports. Oct 11 03:22:10 localhost systemd[1]: Starting Open vSwitch Forwarding Unit... Oct 11 03:22:10 localhost kernel: openvswitch: Open vSwitch switching datapath Oct 11 03:22:10 localhost ovs-ctl[22229]: Inserting openvswitch module [ OK ] Oct 11 03:22:10 localhost ovs-ctl[22198]: Starting ovs-vswitchd [ OK ] Oct 11 03:22:10 localhost ovs-ctl[22198]: Enabling remote OVSDB managers [ OK ] Oct 11 03:22:10 localhost systemd[1]: Started Open vSwitch Forwarding Unit. Oct 11 03:22:10 localhost ovs-vsctl[22248]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005481015.novalocal Oct 11 03:22:10 localhost systemd[1]: Starting Open vSwitch... Oct 11 03:22:10 localhost systemd[1]: Finished Open vSwitch. Oct 11 03:22:13 localhost python3[22266]: ansible-ansible.legacy.command Invoked with _raw_params=os-net-config -c /etc/os-net-config/tripleo_config.yaml#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-1145-62ad-00000000001a-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:22:14 localhost NetworkManager[5989]: [1760167334.3151] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22424 uid=0 result="success" Oct 11 03:22:14 localhost ifup[22425]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:14 localhost ifup[22426]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:14 localhost ifup[22427]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:14 localhost NetworkManager[5989]: [1760167334.3532] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22433 uid=0 result="success" Oct 11 03:22:14 localhost ovs-vsctl[22435]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex other-config:mac-table-size=50000 -- set bridge br-ex other-config:hwaddr=fa:16:3e:fd:8e:0a -- set bridge br-ex fail_mode=standalone -- del-controller br-ex Oct 11 03:22:14 localhost kernel: device ovs-system entered promiscuous mode Oct 11 03:22:14 localhost NetworkManager[5989]: [1760167334.3834] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Oct 11 03:22:14 localhost kernel: Timeout policy base is empty Oct 11 03:22:14 localhost kernel: Failed to associated timeout policy `ovs_test_tp' Oct 11 03:22:14 localhost systemd-udevd[22437]: Network interface NamePolicy= disabled on kernel command line. Oct 11 03:22:14 localhost kernel: device br-ex entered promiscuous mode Oct 11 03:22:14 localhost NetworkManager[5989]: [1760167334.4139] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/5) Oct 11 03:22:14 localhost NetworkManager[5989]: [1760167334.4360] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22462 uid=0 result="success" Oct 11 03:22:14 localhost NetworkManager[5989]: [1760167334.4551] device (br-ex): carrier: link connected Oct 11 03:22:17 localhost NetworkManager[5989]: [1760167337.5071] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22491 uid=0 result="success" Oct 11 03:22:17 localhost NetworkManager[5989]: [1760167337.5559] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22506 uid=0 result="success" Oct 11 03:22:17 localhost NET[22531]: /etc/sysconfig/network-scripts/ifup-post : updated /etc/resolv.conf Oct 11 03:22:17 localhost NetworkManager[5989]: [1760167337.6544] device (eth1): state change: activated -> unmanaged (reason 'unmanaged', sys-iface-state: 'managed') Oct 11 03:22:17 localhost NetworkManager[5989]: [1760167337.6696] dhcp4 (eth1): canceled DHCP transaction Oct 11 03:22:17 localhost NetworkManager[5989]: [1760167337.6697] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Oct 11 03:22:17 localhost NetworkManager[5989]: [1760167337.6698] dhcp4 (eth1): state changed no lease Oct 11 03:22:17 localhost NetworkManager[5989]: [1760167337.6769] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22540 uid=0 result="success" Oct 11 03:22:17 localhost ifup[22541]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:17 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Oct 11 03:22:17 localhost ifup[22542]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:17 localhost ifup[22544]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:17 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Oct 11 03:22:17 localhost NetworkManager[5989]: [1760167337.7137] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22558 uid=0 result="success" Oct 11 03:22:17 localhost NetworkManager[5989]: [1760167337.7581] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22568 uid=0 result="success" Oct 11 03:22:17 localhost NetworkManager[5989]: [1760167337.7660] device (eth1): carrier: link connected Oct 11 03:22:17 localhost NetworkManager[5989]: [1760167337.7873] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22577 uid=0 result="success" Oct 11 03:22:17 localhost ipv6_wait_tentative[22589]: Waiting for interface eth1 IPv6 address(es) to leave the 'tentative' state Oct 11 03:22:18 localhost ipv6_wait_tentative[22594]: Waiting for interface eth1 IPv6 address(es) to leave the 'tentative' state Oct 11 03:22:19 localhost NetworkManager[5989]: [1760167339.8578] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22603 uid=0 result="success" Oct 11 03:22:19 localhost ovs-vsctl[22618]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex eth1 -- add-port br-ex eth1 Oct 11 03:22:19 localhost kernel: device eth1 entered promiscuous mode Oct 11 03:22:19 localhost NetworkManager[5989]: [1760167339.9316] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22626 uid=0 result="success" Oct 11 03:22:19 localhost ifup[22627]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:19 localhost ifup[22628]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:19 localhost ifup[22629]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:19 localhost NetworkManager[5989]: [1760167339.9625] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22635 uid=0 result="success" Oct 11 03:22:20 localhost NetworkManager[5989]: [1760167340.0016] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22645 uid=0 result="success" Oct 11 03:22:20 localhost ifup[22646]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:20 localhost ifup[22647]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:20 localhost ifup[22648]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:20 localhost NetworkManager[5989]: [1760167340.0307] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22654 uid=0 result="success" Oct 11 03:22:20 localhost ovs-vsctl[22657]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Oct 11 03:22:20 localhost kernel: device vlan44 entered promiscuous mode Oct 11 03:22:20 localhost NetworkManager[5989]: [1760167340.0715] manager: (vlan44): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Oct 11 03:22:20 localhost systemd-udevd[22659]: Network interface NamePolicy= disabled on kernel command line. Oct 11 03:22:20 localhost NetworkManager[5989]: [1760167340.0974] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22668 uid=0 result="success" Oct 11 03:22:20 localhost NetworkManager[5989]: [1760167340.1167] device (vlan44): carrier: link connected Oct 11 03:22:23 localhost NetworkManager[5989]: [1760167343.1683] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22697 uid=0 result="success" Oct 11 03:22:23 localhost NetworkManager[5989]: [1760167343.2142] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22712 uid=0 result="success" Oct 11 03:22:23 localhost NetworkManager[5989]: [1760167343.2771] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22733 uid=0 result="success" Oct 11 03:22:23 localhost ifup[22734]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:23 localhost ifup[22735]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:23 localhost ifup[22736]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:23 localhost NetworkManager[5989]: [1760167343.3023] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22742 uid=0 result="success" Oct 11 03:22:23 localhost ovs-vsctl[22745]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Oct 11 03:22:23 localhost systemd-udevd[22747]: Network interface NamePolicy= disabled on kernel command line. Oct 11 03:22:23 localhost kernel: device vlan21 entered promiscuous mode Oct 11 03:22:23 localhost NetworkManager[5989]: [1760167343.3380] manager: (vlan21): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Oct 11 03:22:23 localhost NetworkManager[5989]: [1760167343.3623] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22757 uid=0 result="success" Oct 11 03:22:23 localhost NetworkManager[5989]: [1760167343.3813] device (vlan21): carrier: link connected Oct 11 03:22:26 localhost NetworkManager[5989]: [1760167346.4330] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22787 uid=0 result="success" Oct 11 03:22:26 localhost NetworkManager[5989]: [1760167346.4796] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22802 uid=0 result="success" Oct 11 03:22:26 localhost NetworkManager[5989]: [1760167346.5370] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22823 uid=0 result="success" Oct 11 03:22:26 localhost ifup[22824]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:26 localhost ifup[22825]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:26 localhost ifup[22826]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:26 localhost NetworkManager[5989]: [1760167346.5688] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22832 uid=0 result="success" Oct 11 03:22:26 localhost ovs-vsctl[22835]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Oct 11 03:22:26 localhost kernel: device vlan20 entered promiscuous mode Oct 11 03:22:26 localhost NetworkManager[5989]: [1760167346.6064] manager: (vlan20): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Oct 11 03:22:26 localhost systemd-udevd[22837]: Network interface NamePolicy= disabled on kernel command line. Oct 11 03:22:26 localhost NetworkManager[5989]: [1760167346.6313] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22847 uid=0 result="success" Oct 11 03:22:26 localhost NetworkManager[5989]: [1760167346.6530] device (vlan20): carrier: link connected Oct 11 03:22:27 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Oct 11 03:22:29 localhost NetworkManager[5989]: [1760167349.7053] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22877 uid=0 result="success" Oct 11 03:22:29 localhost NetworkManager[5989]: [1760167349.7604] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22892 uid=0 result="success" Oct 11 03:22:29 localhost NetworkManager[5989]: [1760167349.8249] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22913 uid=0 result="success" Oct 11 03:22:29 localhost ifup[22914]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:29 localhost ifup[22915]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:29 localhost ifup[22916]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:29 localhost NetworkManager[5989]: [1760167349.8622] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22922 uid=0 result="success" Oct 11 03:22:29 localhost ovs-vsctl[22925]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Oct 11 03:22:29 localhost kernel: device vlan22 entered promiscuous mode Oct 11 03:22:29 localhost NetworkManager[5989]: [1760167349.9052] manager: (vlan22): new Generic device (/org/freedesktop/NetworkManager/Devices/9) Oct 11 03:22:29 localhost systemd-udevd[22928]: Network interface NamePolicy= disabled on kernel command line. Oct 11 03:22:29 localhost NetworkManager[5989]: [1760167349.9330] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22937 uid=0 result="success" Oct 11 03:22:29 localhost NetworkManager[5989]: [1760167349.9552] device (vlan22): carrier: link connected Oct 11 03:22:33 localhost NetworkManager[5989]: [1760167353.0164] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22967 uid=0 result="success" Oct 11 03:22:33 localhost NetworkManager[5989]: [1760167353.0660] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22982 uid=0 result="success" Oct 11 03:22:33 localhost NetworkManager[5989]: [1760167353.1192] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23003 uid=0 result="success" Oct 11 03:22:33 localhost ifup[23004]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:33 localhost ifup[23005]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:33 localhost ifup[23006]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:33 localhost NetworkManager[5989]: [1760167353.1462] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23012 uid=0 result="success" Oct 11 03:22:33 localhost ovs-vsctl[23015]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Oct 11 03:22:33 localhost systemd-udevd[23017]: Network interface NamePolicy= disabled on kernel command line. Oct 11 03:22:33 localhost kernel: device vlan23 entered promiscuous mode Oct 11 03:22:33 localhost NetworkManager[5989]: [1760167353.1870] manager: (vlan23): new Generic device (/org/freedesktop/NetworkManager/Devices/10) Oct 11 03:22:33 localhost NetworkManager[5989]: [1760167353.2158] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23027 uid=0 result="success" Oct 11 03:22:33 localhost NetworkManager[5989]: [1760167353.2355] device (vlan23): carrier: link connected Oct 11 03:22:36 localhost NetworkManager[5989]: [1760167356.2848] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23057 uid=0 result="success" Oct 11 03:22:36 localhost NetworkManager[5989]: [1760167356.3344] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23072 uid=0 result="success" Oct 11 03:22:36 localhost NetworkManager[5989]: [1760167356.3963] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23093 uid=0 result="success" Oct 11 03:22:36 localhost ifup[23094]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:36 localhost ifup[23095]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:36 localhost ifup[23096]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:36 localhost NetworkManager[5989]: [1760167356.4292] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23102 uid=0 result="success" Oct 11 03:22:36 localhost ovs-vsctl[23105]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Oct 11 03:22:36 localhost NetworkManager[5989]: [1760167356.4882] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23112 uid=0 result="success" Oct 11 03:22:37 localhost NetworkManager[5989]: [1760167357.5439] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23139 uid=0 result="success" Oct 11 03:22:37 localhost NetworkManager[5989]: [1760167357.5909] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23154 uid=0 result="success" Oct 11 03:22:37 localhost NetworkManager[5989]: [1760167357.6543] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23175 uid=0 result="success" Oct 11 03:22:37 localhost ifup[23176]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:37 localhost ifup[23177]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:37 localhost ifup[23178]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:37 localhost NetworkManager[5989]: [1760167357.6884] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23184 uid=0 result="success" Oct 11 03:22:37 localhost ovs-vsctl[23187]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Oct 11 03:22:37 localhost NetworkManager[5989]: [1760167357.7442] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23194 uid=0 result="success" Oct 11 03:22:38 localhost NetworkManager[5989]: [1760167358.8049] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23222 uid=0 result="success" Oct 11 03:22:38 localhost NetworkManager[5989]: [1760167358.8496] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23237 uid=0 result="success" Oct 11 03:22:38 localhost NetworkManager[5989]: [1760167358.9069] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23258 uid=0 result="success" Oct 11 03:22:38 localhost ifup[23259]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:38 localhost ifup[23260]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:38 localhost ifup[23261]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:38 localhost NetworkManager[5989]: [1760167358.9379] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23267 uid=0 result="success" Oct 11 03:22:38 localhost ovs-vsctl[23270]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Oct 11 03:22:38 localhost NetworkManager[5989]: [1760167358.9925] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23277 uid=0 result="success" Oct 11 03:22:40 localhost NetworkManager[5989]: [1760167360.0471] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23305 uid=0 result="success" Oct 11 03:22:40 localhost NetworkManager[5989]: [1760167360.0814] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23320 uid=0 result="success" Oct 11 03:22:40 localhost NetworkManager[5989]: [1760167360.1197] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23341 uid=0 result="success" Oct 11 03:22:40 localhost ifup[23342]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:40 localhost ifup[23343]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:40 localhost ifup[23344]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:40 localhost NetworkManager[5989]: [1760167360.1421] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23350 uid=0 result="success" Oct 11 03:22:40 localhost ovs-vsctl[23353]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Oct 11 03:22:40 localhost NetworkManager[5989]: [1760167360.1889] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23360 uid=0 result="success" Oct 11 03:22:41 localhost NetworkManager[5989]: [1760167361.2436] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23388 uid=0 result="success" Oct 11 03:22:41 localhost NetworkManager[5989]: [1760167361.2906] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23403 uid=0 result="success" Oct 11 03:22:41 localhost NetworkManager[5989]: [1760167361.3515] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23424 uid=0 result="success" Oct 11 03:22:41 localhost ifup[23425]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Oct 11 03:22:41 localhost ifup[23426]: 'network-scripts' will be removed from distribution in near future. Oct 11 03:22:41 localhost ifup[23427]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Oct 11 03:22:41 localhost NetworkManager[5989]: [1760167361.3832] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23433 uid=0 result="success" Oct 11 03:22:41 localhost ovs-vsctl[23436]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Oct 11 03:22:41 localhost NetworkManager[5989]: [1760167361.4406] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23443 uid=0 result="success" Oct 11 03:22:42 localhost NetworkManager[5989]: [1760167362.4968] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23471 uid=0 result="success" Oct 11 03:22:42 localhost NetworkManager[5989]: [1760167362.5443] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23486 uid=0 result="success" Oct 11 03:23:35 localhost python3[23518]: ansible-ansible.legacy.command Invoked with _raw_params=ip a#012ping -c 2 -W 2 192.168.122.10#012ping -c 2 -W 2 192.168.122.11#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-1145-62ad-00000000001b-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:23:41 localhost python3[23537]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 03:23:42 localhost python3[23553]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 03:23:43 localhost python3[23567]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 03:23:44 localhost python3[23583]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Oct 11 03:23:45 localhost python3[23597]: ansible-ansible.builtin.slurp Invoked with path=/etc/hostname src=/etc/hostname Oct 11 03:23:46 localhost python3[23612]: ansible-ansible.legacy.command Invoked with _raw_params=hostname="np0005481015.novalocal"#012hostname_str_array=(${hostname//./ })#012echo ${hostname_str_array[0]} > /home/zuul/ansible_hostname#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-1145-62ad-000000000022-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:23:46 localhost python3[23632]: ansible-ansible.legacy.command Invoked with _raw_params=hostname=$(cat /home/zuul/ansible_hostname)#012hostnamectl hostname "$hostname.ooo.test"#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-1145-62ad-000000000023-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:23:46 localhost systemd[1]: Starting Hostname Service... Oct 11 03:23:47 localhost systemd[1]: Started Hostname Service. Oct 11 03:23:47 localhost systemd-hostnamed[23636]: Hostname set to (static) Oct 11 03:23:47 localhost NetworkManager[5989]: [1760167427.0458] hostname: static hostname changed from "np0005481015.novalocal" to "np0005481015.ooo.test" Oct 11 03:23:47 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Oct 11 03:23:47 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Oct 11 03:23:48 localhost systemd[1]: session-10.scope: Deactivated successfully. Oct 11 03:23:48 localhost systemd[1]: session-10.scope: Consumed 1min 42.511s CPU time. Oct 11 03:23:48 localhost systemd-logind[763]: Session 10 logged out. Waiting for processes to exit. Oct 11 03:23:48 localhost systemd-logind[763]: Removed session 10. Oct 11 03:23:50 localhost sshd[23647]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:23:50 localhost systemd-logind[763]: New session 11 of user zuul. Oct 11 03:23:50 localhost systemd[1]: Started Session 11 of User zuul. Oct 11 03:23:51 localhost python3[23664]: ansible-ansible.builtin.slurp Invoked with path=/home/zuul/ansible_hostname src=/home/zuul/ansible_hostname Oct 11 03:23:53 localhost systemd[1]: session-11.scope: Deactivated successfully. Oct 11 03:23:53 localhost systemd-logind[763]: Session 11 logged out. Waiting for processes to exit. Oct 11 03:23:53 localhost systemd-logind[763]: Removed session 11. Oct 11 03:23:57 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Oct 11 03:24:17 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 11 03:24:39 localhost sshd[23670]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:24:39 localhost systemd-logind[763]: New session 12 of user zuul. Oct 11 03:24:39 localhost systemd[1]: Started Session 12 of User zuul. Oct 11 03:24:40 localhost python3[23689]: ansible-ansible.legacy.dnf Invoked with name=['ipa-client'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 03:24:46 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Oct 11 03:24:46 localhost dbus-broker-launch[18343]: Noticed file-system modification, trigger reload. Oct 11 03:24:46 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Oct 11 03:24:46 localhost dbus-broker-launch[18343]: Service file '/usr/share/dbus-1/services/certmonger.service' is not named after the D-Bus name 'org.fedorahosted.certmonger'. Oct 11 03:24:46 localhost dbus-broker-launch[18343]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Oct 11 03:24:46 localhost dbus-broker-launch[18343]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Oct 11 03:24:46 localhost systemd[1]: Reloading. Oct 11 03:24:46 localhost systemd-rc-local-generator[23789]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:24:46 localhost systemd-sysv-generator[23792]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:24:46 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:24:55 localhost kernel: SELinux: Converting 540 SID table entries... Oct 11 03:24:55 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 03:24:55 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 03:24:55 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 03:24:55 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 03:24:55 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 03:24:55 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 03:24:55 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 03:24:56 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Oct 11 03:24:56 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=5 res=1 Oct 11 03:24:56 localhost systemd[1]: Stopping OpenSSH server daemon... Oct 11 03:24:56 localhost systemd[1]: sshd.service: Deactivated successfully. Oct 11 03:24:56 localhost systemd[1]: Stopped OpenSSH server daemon. Oct 11 03:24:56 localhost systemd[1]: sshd.service: Consumed 1.337s CPU time. Oct 11 03:24:56 localhost systemd[1]: Stopped target sshd-keygen.target. Oct 11 03:24:56 localhost systemd[1]: Stopping sshd-keygen.target... Oct 11 03:24:56 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 03:24:56 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 03:24:56 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 03:24:56 localhost systemd[1]: Reached target sshd-keygen.target. Oct 11 03:24:56 localhost systemd[1]: Starting OpenSSH server daemon... Oct 11 03:24:56 localhost sshd[23826]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:24:56 localhost systemd[1]: Started OpenSSH server daemon. Oct 11 03:24:57 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 11 03:24:57 localhost systemd[1]: Starting man-db-cache-update.service... Oct 11 03:24:57 localhost systemd[1]: Reloading. Oct 11 03:24:57 localhost systemd-rc-local-generator[24384]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:24:57 localhost systemd-sysv-generator[24390]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:24:58 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:24:58 localhost systemd[1]: Queuing reload/restart jobs for marked units… Oct 11 03:24:58 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 11 03:24:59 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 11 03:24:59 localhost systemd[1]: Finished man-db-cache-update.service. Oct 11 03:24:59 localhost systemd[1]: man-db-cache-update.service: Consumed 1.523s CPU time. Oct 11 03:24:59 localhost systemd[1]: run-r9a6777fc9d26479f944fe117c6f4be5d.service: Deactivated successfully. Oct 11 03:24:59 localhost systemd[1]: run-raf6e9560874647b9b4913209548418fd.service: Deactivated successfully. Oct 11 03:25:59 localhost systemd[1]: session-12.scope: Deactivated successfully. Oct 11 03:25:59 localhost systemd[1]: session-12.scope: Consumed 17.178s CPU time. Oct 11 03:25:59 localhost systemd-logind[763]: Session 12 logged out. Waiting for processes to exit. Oct 11 03:25:59 localhost systemd-logind[763]: Removed session 12. Oct 11 03:26:23 localhost sshd[25791]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:26:24 localhost systemd-logind[763]: New session 13 of user zuul. Oct 11 03:26:24 localhost systemd[1]: Started Session 13 of User zuul. Oct 11 03:26:24 localhost python3[25842]: ansible-ansible.legacy.stat Invoked with path=/etc/resolv.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:26:24 localhost python3[25887]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1760167584.210151-62-154314531273815/source dest=/etc/resolv.conf owner=root group=root mode=420 follow=False _original_basename=ipa_resolv_conf.j2 checksum=edbe9a45130a7ebff5948216d04bc5bb05808e49 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:26:28 localhost python3[25917]: ansible-ansible.legacy.command Invoked with _raw_params=ip route add 10.255.255.25 via 192.168.122.100 dev br-ex _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:26:30 localhost python3[25935]: ansible-ansible.builtin.file Invoked with path=/etc/pki/CA state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:27:30 localhost systemd[1]: session-13.scope: Deactivated successfully. Oct 11 03:27:30 localhost systemd[1]: session-13.scope: Consumed 1.099s CPU time. Oct 11 03:27:30 localhost systemd-logind[763]: Session 13 logged out. Waiting for processes to exit. Oct 11 03:27:30 localhost systemd-logind[763]: Removed session 13. Oct 11 03:30:42 localhost sshd[25937]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:31:48 localhost sshd[25938]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:35:28 localhost sshd[25941]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:35:36 localhost sshd[25943]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:36:22 localhost sshd[25945]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:38:33 localhost sshd[25946]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:45:22 localhost sshd[25949]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:45:23 localhost sshd[25950]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:52:03 localhost sshd[25953]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:55:14 localhost sshd[25956]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:55:15 localhost systemd-logind[763]: New session 14 of user zuul. Oct 11 03:55:15 localhost systemd[1]: Started Session 14 of User zuul. Oct 11 03:55:15 localhost python3[26004]: ansible-ansible.legacy.ping Invoked with data=pong Oct 11 03:55:16 localhost python3[26049]: ansible-setup Invoked with gather_subset=['!facter', '!ohai'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 03:55:16 localhost python3[26069]: ansible-user Invoked with name=tripleo-admin generate_ssh_key=False state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005481015.ooo.test update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Oct 11 03:55:16 localhost systemd-journald[617]: Field hash table of /run/log/journal/0d75598033f175d0e781a840bff83569/system.journal has a fill level at 76.6 (255 of 333 items), suggesting rotation. Oct 11 03:55:16 localhost systemd-journald[617]: /run/log/journal/0d75598033f175d0e781a840bff83569/system.journal: Journal header limits reached or header out-of-date, rotating. Oct 11 03:55:16 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 03:55:16 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 03:55:17 localhost python3[26128]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/tripleo-admin follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:55:18 localhost python3[26171]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/tripleo-admin mode=288 owner=root group=root src=/home/zuul/.ansible/tmp/ansible-tmp-1760169317.2257419-83274-82978593647372/source _original_basename=tmpe6vch0i0 follow=False checksum=b3e7ecdcc699d217c6b083a91b07208207813d93 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:55:18 localhost python3[26201]: ansible-file Invoked with path=/home/tripleo-admin state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:55:18 localhost python3[26217]: ansible-file Invoked with path=/home/tripleo-admin/.ssh state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:55:19 localhost python3[26233]: ansible-file Invoked with path=/home/tripleo-admin/.ssh/authorized_keys state=touch owner=tripleo-admin group=tripleo-admin mode=384 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:55:20 localhost python3[26249]: ansible-lineinfile Invoked with path=/home/tripleo-admin/.ssh/authorized_keys line=ssh-rsa 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 zuul-build-sshkey#012 regexp=Generated by TripleO state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:55:20 localhost python3[26263]: ansible-ping Invoked with data=pong Oct 11 03:55:31 localhost sshd[26264]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:55:32 localhost systemd-logind[763]: New session 15 of user tripleo-admin. Oct 11 03:55:32 localhost systemd[1]: Created slice User Slice of UID 1002. Oct 11 03:55:32 localhost systemd[1]: Starting User Runtime Directory /run/user/1002... Oct 11 03:55:32 localhost systemd[1]: Finished User Runtime Directory /run/user/1002. Oct 11 03:55:32 localhost systemd[1]: Starting User Manager for UID 1002... Oct 11 03:55:32 localhost systemd[26268]: Queued start job for default target Main User Target. Oct 11 03:55:32 localhost systemd[26268]: Created slice User Application Slice. Oct 11 03:55:32 localhost systemd[26268]: Started Mark boot as successful after the user session has run 2 minutes. Oct 11 03:55:32 localhost systemd[26268]: Started Daily Cleanup of User's Temporary Directories. Oct 11 03:55:32 localhost systemd[26268]: Reached target Paths. Oct 11 03:55:32 localhost systemd[26268]: Reached target Timers. Oct 11 03:55:32 localhost systemd[26268]: Starting D-Bus User Message Bus Socket... Oct 11 03:55:32 localhost systemd[26268]: Starting Create User's Volatile Files and Directories... Oct 11 03:55:32 localhost systemd[26268]: Listening on D-Bus User Message Bus Socket. Oct 11 03:55:32 localhost systemd[26268]: Finished Create User's Volatile Files and Directories. Oct 11 03:55:32 localhost systemd[26268]: Reached target Sockets. Oct 11 03:55:32 localhost systemd[26268]: Reached target Basic System. Oct 11 03:55:32 localhost systemd[26268]: Reached target Main User Target. Oct 11 03:55:32 localhost systemd[26268]: Startup finished in 94ms. Oct 11 03:55:32 localhost systemd[1]: Started User Manager for UID 1002. Oct 11 03:55:32 localhost systemd[1]: Started Session 15 of User tripleo-admin. Oct 11 03:55:32 localhost python3[26329]: ansible-ansible.legacy.setup Invoked with gather_subset=['!all', 'min'] gather_timeout=45 filter=[] fact_path=/etc/ansible/facts.d Oct 11 03:55:37 localhost python3[26349]: ansible-selinux Invoked with policy=targeted state=enforcing configfile=/etc/selinux/config Oct 11 03:55:38 localhost python3[26365]: ansible-tempfile Invoked with state=file suffix=tmphosts prefix=ansible. path=None Oct 11 03:55:38 localhost python3[26413]: ansible-ansible.legacy.copy Invoked with remote_src=True src=/etc/hosts dest=/tmp/ansible.yv_6e9xptmphosts mode=preserve backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None local_follow=None checksum=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:55:39 localhost python3[26443]: ansible-blockinfile Invoked with state=absent path=/tmp/ansible.yv_6e9xptmphosts block= marker=# {mark} marker_begin=HEAT_HOSTS_START - Do not edit manually within this section! marker_end=HEAT_HOSTS_END create=False backup=False unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:55:40 localhost python3[26459]: ansible-blockinfile Invoked with create=True path=/tmp/ansible.yv_6e9xptmphosts insertbefore=BOF block=172.17.0.106 np0005481016.ooo.test np0005481016#012172.18.0.106 np0005481016.storage.ooo.test np0005481016.storage#012172.17.0.106 np0005481016.internalapi.ooo.test np0005481016.internalapi#012172.19.0.106 np0005481016.tenant.ooo.test np0005481016.tenant#012192.168.122.106 np0005481016.ctlplane.ooo.test np0005481016.ctlplane#012172.17.0.107 np0005481017.ooo.test np0005481017#012172.18.0.107 np0005481017.storage.ooo.test np0005481017.storage#012172.17.0.107 np0005481017.internalapi.ooo.test np0005481017.internalapi#012172.19.0.107 np0005481017.tenant.ooo.test np0005481017.tenant#012192.168.122.107 np0005481017.ctlplane.ooo.test np0005481017.ctlplane#012172.17.0.108 np0005481019.ooo.test np0005481019#012172.18.0.108 np0005481019.storage.ooo.test np0005481019.storage#012172.17.0.108 np0005481019.internalapi.ooo.test np0005481019.internalapi#012172.19.0.108 np0005481019.tenant.ooo.test np0005481019.tenant#012192.168.122.108 np0005481019.ctlplane.ooo.test np0005481019.ctlplane#012172.17.0.103 np0005481012.ooo.test np0005481012#012172.18.0.103 np0005481012.storage.ooo.test np0005481012.storage#012172.20.0.103 np0005481012.storagemgmt.ooo.test np0005481012.storagemgmt#012172.17.0.103 np0005481012.internalapi.ooo.test np0005481012.internalapi#012172.19.0.103 np0005481012.tenant.ooo.test np0005481012.tenant#012172.21.0.103 np0005481012.external.ooo.test np0005481012.external#012192.168.122.103 np0005481012.ctlplane.ooo.test np0005481012.ctlplane#012172.17.0.104 np0005481014.ooo.test np0005481014#012172.18.0.104 np0005481014.storage.ooo.test np0005481014.storage#012172.20.0.104 np0005481014.storagemgmt.ooo.test np0005481014.storagemgmt#012172.17.0.104 np0005481014.internalapi.ooo.test np0005481014.internalapi#012172.19.0.104 np0005481014.tenant.ooo.test np0005481014.tenant#012172.21.0.104 np0005481014.external.ooo.test np0005481014.external#012192.168.122.104 np0005481014.ctlplane.ooo.test np0005481014.ctlplane#012172.17.0.105 np0005481015.ooo.test np0005481015#012172.18.0.105 np0005481015.storage.ooo.test np0005481015.storage#012172.20.0.105 np0005481015.storagemgmt.ooo.test np0005481015.storagemgmt#012172.17.0.105 np0005481015.internalapi.ooo.test np0005481015.internalapi#012172.19.0.105 np0005481015.tenant.ooo.test np0005481015.tenant#012172.21.0.105 np0005481015.external.ooo.test np0005481015.external#012192.168.122.105 np0005481015.ctlplane.ooo.test np0005481015.ctlplane#012#012192.168.122.100 undercloud.ctlplane.ooo.test undercloud.ctlplane#012192.168.122.99 overcloud.ctlplane.ooo.test#012172.18.0.247 overcloud.storage.ooo.test#012172.20.0.124 overcloud.storagemgmt.ooo.test#012172.17.0.232 overcloud.internalapi.ooo.test#012172.21.0.199 overcloud.ooo.test#012 marker=# {mark} marker_begin=START_HOST_ENTRIES_FOR_STACK: overcloud marker_end=END_HOST_ENTRIES_FOR_STACK: overcloud state=present backup=False unsafe_writes=False insertafter=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:55:40 localhost python3[26475]: ansible-ansible.legacy.command Invoked with _raw_params=cp "/tmp/ansible.yv_6e9xptmphosts" "/etc/hosts" _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:55:41 localhost python3[26492]: ansible-file Invoked with path=/tmp/ansible.yv_6e9xptmphosts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:55:42 localhost python3[26508]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides rhosp-release _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:55:42 localhost python3[26525]: ansible-ansible.legacy.dnf Invoked with name=['rhosp-release'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 03:55:47 localhost python3[26544]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:55:47 localhost python3[26561]: ansible-ansible.legacy.dnf Invoked with name=['driverctl', 'lvm2', 'jq', 'nftables', 'openvswitch', 'openstack-heat-agents', 'openstack-selinux', 'os-net-config', 'python3-libselinux', 'python3-pyyaml', 'puppet-tripleo', 'rsync', 'tmpwatch', 'sysstat', 'iproute-tc'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 03:56:01 localhost systemd[1]: Reloading. Oct 11 03:56:01 localhost systemd-rc-local-generator[26752]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:56:01 localhost systemd-sysv-generator[26759]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:56:01 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:56:01 localhost systemd[1]: Listening on Device-mapper event daemon FIFOs. Oct 11 03:56:09 localhost systemd[1]: Reloading. Oct 11 03:56:09 localhost systemd-rc-local-generator[26826]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:56:09 localhost systemd-sysv-generator[26830]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:56:09 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:56:09 localhost systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Oct 11 03:56:09 localhost systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Oct 11 03:56:09 localhost systemd[1]: Reloading. Oct 11 03:56:09 localhost systemd-rc-local-generator[26864]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:56:09 localhost systemd-sysv-generator[26867]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:56:10 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:56:10 localhost systemd[1]: Listening on LVM2 poll daemon socket. Oct 11 03:56:58 localhost kernel: SELinux: Converting 2713 SID table entries... Oct 11 03:56:58 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 03:56:58 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 03:56:58 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 03:56:58 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 03:56:58 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 03:56:58 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 03:56:58 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 03:56:59 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=7 res=1 Oct 11 03:56:59 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 11 03:56:59 localhost systemd[1]: Starting man-db-cache-update.service... Oct 11 03:56:59 localhost systemd[1]: Reloading. Oct 11 03:56:59 localhost systemd-rc-local-generator[28333]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:56:59 localhost systemd-sysv-generator[28336]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:56:59 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:56:59 localhost systemd[1]: Queuing reload/restart jobs for marked units… Oct 11 03:56:59 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 11 03:57:00 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 11 03:57:00 localhost systemd[1]: Finished man-db-cache-update.service. Oct 11 03:57:00 localhost systemd[1]: run-r035bb842bd9c4794ab2800595c617fc2.service: Deactivated successfully. Oct 11 03:57:00 localhost systemd[1]: run-r91c0edaf6bda47caace35387de78abcf.service: Deactivated successfully. Oct 11 03:57:02 localhost python3[29207]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -V driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:03 localhost python3[29346]: ansible-ansible.legacy.systemd Invoked with name=openvswitch enabled=True state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 03:57:03 localhost systemd[1]: Reloading. Oct 11 03:57:03 localhost systemd-rc-local-generator[29368]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:57:03 localhost systemd-sysv-generator[29374]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:57:03 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:57:05 localhost python3[29400]: ansible-file Invoked with path=/var/lib/heat-config/tripleo-config-download state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:05 localhost python3[29416]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides openstack-network-scripts _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:06 localhost python3[29433]: ansible-systemd Invoked with name=NetworkManager enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Oct 11 03:57:07 localhost python3[29451]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=dns value=none backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:07 localhost python3[29469]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=rc-manager value=unmanaged backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:08 localhost python3[29487]: ansible-ansible.legacy.systemd Invoked with name=NetworkManager state=reloaded daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 03:57:08 localhost systemd[1]: Reloading Network Manager... Oct 11 03:57:08 localhost NetworkManager[5989]: [1760169428.2111] audit: op="reload" arg="0" pid=29490 uid=0 result="success" Oct 11 03:57:08 localhost NetworkManager[5989]: [1760169428.2128] config: signal: SIGHUP,config-files,values,values-user,no-auto-default,dns-mode,rc-manager (/etc/NetworkManager/NetworkManager.conf (lib: 00-server.conf) (run: 15-carrier-timeout.conf)) Oct 11 03:57:08 localhost NetworkManager[5989]: [1760169428.2129] dns-mgr: init: dns=none,systemd-resolved rc-manager=unmanaged Oct 11 03:57:08 localhost systemd[1]: Reloaded Network Manager. Oct 11 03:57:08 localhost python3[29506]: ansible-ansible.legacy.command Invoked with _raw_params=ln -f -s /usr/share/openstack-puppet/modules/* /etc/puppet/modules/ _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:09 localhost python3[29523]: ansible-stat Invoked with path=/usr/bin/ansible-playbook follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 03:57:09 localhost python3[29541]: ansible-stat Invoked with path=/usr/bin/ansible-playbook-3 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 03:57:09 localhost python3[29557]: ansible-file Invoked with state=link src=/usr/bin/ansible-playbook path=/usr/bin/ansible-playbook-3 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:10 localhost python3[29573]: ansible-tempfile Invoked with state=file prefix=ansible. suffix= path=None Oct 11 03:57:11 localhost python3[29589]: ansible-stat Invoked with path=/etc/ssh/ssh_known_hosts follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 03:57:11 localhost python3[29605]: ansible-blockinfile Invoked with path=/tmp/ansible.939efb9d block=[192.168.122.106]*,[np0005481016.ctlplane.ooo.test]*,[172.17.0.106]*,[np0005481016.internalapi.ooo.test]*,[172.18.0.106]*,[np0005481016.storage.ooo.test]*,[172.19.0.106]*,[np0005481016.tenant.ooo.test]*,[np0005481016.ooo.test]*,[np0005481016]* ssh-rsa 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#012[192.168.122.107]*,[np0005481017.ctlplane.ooo.test]*,[172.17.0.107]*,[np0005481017.internalapi.ooo.test]*,[172.18.0.107]*,[np0005481017.storage.ooo.test]*,[172.19.0.107]*,[np0005481017.tenant.ooo.test]*,[np0005481017.ooo.test]*,[np0005481017]* ssh-rsa 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#012[192.168.122.108]*,[np0005481019.ctlplane.ooo.test]*,[172.17.0.108]*,[np0005481019.internalapi.ooo.test]*,[172.18.0.108]*,[np0005481019.storage.ooo.test]*,[172.19.0.108]*,[np0005481019.tenant.ooo.test]*,[np0005481019.ooo.test]*,[np0005481019]* ssh-rsa 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#012[192.168.122.103]*,[np0005481012.ctlplane.ooo.test]*,[172.21.0.103]*,[np0005481012.external.ooo.test]*,[172.17.0.103]*,[np0005481012.internalapi.ooo.test]*,[172.18.0.103]*,[np0005481012.storage.ooo.test]*,[172.20.0.103]*,[np0005481012.storagemgmt.ooo.test]*,[172.19.0.103]*,[np0005481012.tenant.ooo.test]*,[np0005481012.ooo.test]*,[np0005481012]* ssh-rsa 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#012[192.168.122.104]*,[np0005481014.ctlplane.ooo.test]*,[172.21.0.104]*,[np0005481014.external.ooo.test]*,[172.17.0.104]*,[np0005481014.internalapi.ooo.test]*,[172.18.0.104]*,[np0005481014.storage.ooo.test]*,[172.20.0.104]*,[np0005481014.storagemgmt.ooo.test]*,[172.19.0.104]*,[np0005481014.tenant.ooo.test]*,[np0005481014.ooo.test]*,[np0005481014]* ssh-rsa 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#012[192.168.122.105]*,[np0005481015.ctlplane.ooo.test]*,[172.21.0.105]*,[np0005481015.external.ooo.test]*,[172.17.0.105]*,[np0005481015.internalapi.ooo.test]*,[172.18.0.105]*,[np0005481015.storage.ooo.test]*,[172.20.0.105]*,[np0005481015.storagemgmt.ooo.test]*,[172.19.0.105]*,[np0005481015.tenant.ooo.test]*,[np0005481015.ooo.test]*,[np0005481015]* ssh-rsa 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#012 create=True state=present marker=# {mark} ANSIBLE MANAGED BLOCK backup=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:12 localhost python3[29621]: ansible-ansible.legacy.command Invoked with _raw_params=cat '/tmp/ansible.939efb9d' > /etc/ssh/ssh_known_hosts _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:12 localhost python3[29639]: ansible-file Invoked with path=/tmp/ansible.939efb9d state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:13 localhost python3[29655]: ansible-file Invoked with path=/var/log/journal state=directory mode=0750 owner=root group=root setype=var_log_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Oct 11 03:57:14 localhost python3[29671]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active cloud-init.service || systemctl is-enabled cloud-init.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:14 localhost python3[29689]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline | grep -q cloud-init=disabled _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:14 localhost python3[29708]: ansible-community.general.cloud_init_data_facts Invoked with filter=status Oct 11 03:57:17 localhost python3[29845]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:17 localhost python3[29862]: ansible-ansible.legacy.dnf Invoked with name=['tuned', 'tuned-profiles-cpu-partitioning'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 03:57:20 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Oct 11 03:57:20 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Oct 11 03:57:21 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 11 03:57:21 localhost systemd[1]: Starting man-db-cache-update.service... Oct 11 03:57:21 localhost systemd[1]: Reloading. Oct 11 03:57:21 localhost systemd-rc-local-generator[29930]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:57:21 localhost systemd-sysv-generator[29937]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:57:21 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:57:21 localhost systemd[1]: Queuing reload/restart jobs for marked units… Oct 11 03:57:21 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Oct 11 03:57:21 localhost systemd[1]: tuned.service: Deactivated successfully. Oct 11 03:57:21 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Oct 11 03:57:21 localhost systemd[1]: tuned.service: Consumed 1.654s CPU time. Oct 11 03:57:21 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Oct 11 03:57:21 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 11 03:57:21 localhost systemd[1]: Finished man-db-cache-update.service. Oct 11 03:57:21 localhost systemd[1]: run-rc5378cddd4844558a1f202ae0d3822c6.service: Deactivated successfully. Oct 11 03:57:22 localhost systemd[1]: Started Dynamic System Tuning Daemon. Oct 11 03:57:22 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Oct 11 03:57:22 localhost systemd[1]: Starting man-db-cache-update.service... Oct 11 03:57:23 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Oct 11 03:57:23 localhost systemd[1]: Finished man-db-cache-update.service. Oct 11 03:57:23 localhost systemd[1]: run-ra110cdf164a54cac828a10ec0e31f1ba.service: Deactivated successfully. Oct 11 03:57:24 localhost python3[30308]: ansible-systemd Invoked with name=tuned state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 03:57:25 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Oct 11 03:57:25 localhost systemd[1]: tuned.service: Deactivated successfully. Oct 11 03:57:25 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Oct 11 03:57:25 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Oct 11 03:57:26 localhost systemd[1]: Started Dynamic System Tuning Daemon. Oct 11 03:57:26 localhost python3[30504]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:27 localhost python3[30521]: ansible-slurp Invoked with src=/etc/tuned/active_profile Oct 11 03:57:28 localhost python3[30537]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 03:57:28 localhost python3[30553]: ansible-ansible.legacy.command Invoked with _raw_params=tuned-adm profile throughput-performance _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:30 localhost python3[30573]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:57:30 localhost python3[30590]: ansible-stat Invoked with path=/var/lib/config-data/puppet-generated/nova_libvirt/etc/nova/nova.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 03:57:34 localhost python3[30606]: ansible-replace Invoked with regexp=TRIPLEO_HEAT_TEMPLATE_KERNEL_ARGS dest=/etc/default/grub replace= path=/etc/default/grub backup=False encoding=utf-8 unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:38 localhost python3[30622]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:38 localhost python3[30670]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:39 localhost python3[30715]: ansible-ansible.legacy.copy Invoked with mode=384 dest=/etc/puppet/hiera.yaml src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169458.483574-88679-171074083931902/source _original_basename=tmppsgc6i_f follow=False checksum=aaf3699defba931d532f4955ae152f505046749a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:39 localhost python3[30745]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:40 localhost python3[30793]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:40 localhost python3[30836]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169460.1253614-88913-269840399575874/source dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json follow=False checksum=95752773bec5e42a0bd51fd13d9914ae8e709915 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:41 localhost python3[30898]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:41 localhost python3[30941]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169461.0459092-89050-58218212063768/source dest=/etc/puppet/hieradata/bootstrap_node.json mode=None follow=False _original_basename=bootstrap_node.j2 checksum=fbf18c0e936e3bb6489f6593de0653bb642f24c1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:42 localhost python3[31003]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:42 localhost python3[31046]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169461.9974256-89050-68140615126633/source dest=/etc/puppet/hieradata/vip_data.json mode=None follow=False _original_basename=vip_data.j2 checksum=a861c69a8e07ecad327dd2b56e101b87bc8adc07 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:43 localhost python3[31108]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:44 localhost python3[31151]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169463.016729-89050-106869635890469/source dest=/etc/puppet/hieradata/net_ip_map.json mode=None follow=False _original_basename=net_ip_map.j2 checksum=67dce5a9d3e5afcc493ab8a2bfd1b7dcebd64331 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:44 localhost python3[31213]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:45 localhost python3[31256]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169464.2562304-89050-266676978529224/source dest=/etc/puppet/hieradata/cloud_domain.json mode=None follow=False _original_basename=cloud_domain.j2 checksum=64f5f309f5137b9e0913cbf22857157ecfa0f1f1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:45 localhost python3[31318]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:46 localhost python3[31361]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169465.1964781-89050-104722295863076/source dest=/etc/puppet/hieradata/fqdn.json mode=None follow=False _original_basename=fqdn.j2 checksum=f5f75c2a607d08f5f898d4474690b382d2a94b22 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:46 localhost python3[31423]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:47 localhost python3[31466]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169466.1900697-89050-17006106379156/source dest=/etc/puppet/hieradata/service_names.json mode=None follow=False _original_basename=service_names.j2 checksum=f3a297f9489dbabd957eb904b4140ce21e05b558 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:47 localhost python3[31528]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:47 localhost python3[31571]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169467.1832964-89050-192072841164457/source dest=/etc/puppet/hieradata/service_configs.json mode=None follow=False _original_basename=service_configs.j2 checksum=917364b04610706fe7dceb5fbb208989af47e99d backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:48 localhost python3[31633]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:48 localhost python3[31676]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169468.1395266-89050-79534159200533/source dest=/etc/puppet/hieradata/extraconfig.json mode=None follow=False _original_basename=extraconfig.j2 checksum=5f36b2ea290645ee34d943220a14b54ee5ea5be5 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:49 localhost python3[31738]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:49 localhost python3[31781]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169469.1370764-89050-226831348378894/source dest=/etc/puppet/hieradata/role_extraconfig.json mode=None follow=False _original_basename=role_extraconfig.j2 checksum=ad2ff5cbdfc5332b5cb47860d7f73fa8fd81a43a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:50 localhost python3[31843]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:50 localhost python3[31886]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169470.0909991-89050-193765391008483/source dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json mode=None follow=False _original_basename=ovn_chassis_mac_map.j2 checksum=2d1c08c118455e6d80849f679391bf74ed998e1d backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:51 localhost python3[31916]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 03:57:52 localhost python3[31964]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:57:52 localhost python3[32007]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/ansible_managed.json owner=root group=root mode=0644 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169471.8132455-90642-15122779765949/source _original_basename=tmpp_14lx7n follow=False checksum=bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:57:57 localhost python3[32037]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_default_ipv4'] gather_timeout=10 fact_path=/etc/ansible/facts.d Oct 11 03:57:57 localhost python3[32098]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 38.102.83.1 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:02 localhost python3[32115]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 192.168.122.10 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:07 localhost python3[32132]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 192.168.122.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:07 localhost python3[32155]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 192.168.122.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:12 localhost python3[32172]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.18.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:12 localhost python3[32195]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.18.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:17 localhost python3[32212]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.18.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:21 localhost python3[32229]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.20.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:22 localhost python3[32252]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.20.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:22 localhost systemd[26268]: Starting Mark boot as successful... Oct 11 03:58:22 localhost systemd[26268]: Finished Mark boot as successful. Oct 11 03:58:26 localhost python3[32270]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.20.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:31 localhost python3[32287]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.17.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:31 localhost python3[32310]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.17.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:36 localhost python3[32327]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.17.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:40 localhost python3[32344]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.19.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:40 localhost python3[32367]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.19.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:45 localhost python3[32384]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.19.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:49 localhost python3[32401]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.21.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:50 localhost python3[32424]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.21.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:58:54 localhost python3[32441]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.21.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:59:00 localhost python3[32458]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:00 localhost python3[32506]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:01 localhost python3[32524]: ansible-ansible.legacy.file Invoked with mode=384 dest=/etc/puppet/hiera.yaml _original_basename=tmp4f4jcif8 recurse=False state=file path=/etc/puppet/hiera.yaml force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:01 localhost python3[32554]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:02 localhost python3[32602]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:02 localhost python3[32620]: ansible-ansible.legacy.file Invoked with dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json recurse=False state=file path=/etc/puppet/hieradata/all_nodes.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:03 localhost python3[32682]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:03 localhost python3[32700]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/bootstrap_node.json _original_basename=bootstrap_node.j2 recurse=False state=file path=/etc/puppet/hieradata/bootstrap_node.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:04 localhost python3[32762]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:04 localhost python3[32780]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/vip_data.json _original_basename=vip_data.j2 recurse=False state=file path=/etc/puppet/hieradata/vip_data.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:05 localhost python3[32842]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:05 localhost python3[32860]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/net_ip_map.json _original_basename=net_ip_map.j2 recurse=False state=file path=/etc/puppet/hieradata/net_ip_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:05 localhost python3[32922]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:06 localhost python3[32940]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/cloud_domain.json _original_basename=cloud_domain.j2 recurse=False state=file path=/etc/puppet/hieradata/cloud_domain.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:06 localhost python3[33002]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:07 localhost sshd[33021]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:59:07 localhost python3[33020]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/fqdn.json _original_basename=fqdn.j2 recurse=False state=file path=/etc/puppet/hieradata/fqdn.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:07 localhost sshd[33036]: main: sshd: ssh-rsa algorithm is disabled Oct 11 03:59:07 localhost python3[33084]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:07 localhost python3[33102]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_names.json _original_basename=service_names.j2 recurse=False state=file path=/etc/puppet/hieradata/service_names.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:08 localhost python3[33164]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:08 localhost python3[33182]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_configs.json _original_basename=service_configs.j2 recurse=False state=file path=/etc/puppet/hieradata/service_configs.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:09 localhost python3[33244]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:09 localhost python3[33262]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/extraconfig.json _original_basename=extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:10 localhost python3[33324]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:10 localhost python3[33342]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/role_extraconfig.json _original_basename=role_extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/role_extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:10 localhost python3[33404]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:11 localhost python3[33422]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json _original_basename=ovn_chassis_mac_map.j2 recurse=False state=file path=/etc/puppet/hieradata/ovn_chassis_mac_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:11 localhost python3[33452]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 03:59:12 localhost python3[33500]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:12 localhost python3[33518]: ansible-ansible.legacy.file Invoked with owner=root group=root mode=0644 dest=/etc/puppet/hieradata/ansible_managed.json _original_basename=tmp15_ee00k recurse=False state=file path=/etc/puppet/hieradata/ansible_managed.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:15 localhost python3[33548]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 03:59:20 localhost python3[33565]: ansible-ansible.builtin.systemd Invoked with name=iptables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 03:59:20 localhost python3[33583]: ansible-ansible.builtin.systemd Invoked with name=ip6tables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 03:59:21 localhost python3[33601]: ansible-ansible.builtin.systemd Invoked with name=nftables state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 03:59:21 localhost systemd[1]: Reloading. Oct 11 03:59:21 localhost systemd-rc-local-generator[33631]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:59:21 localhost systemd-sysv-generator[33634]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:59:21 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:59:21 localhost systemd[1]: Starting Netfilter Tables... Oct 11 03:59:21 localhost systemd[1]: Finished Netfilter Tables. Oct 11 03:59:22 localhost python3[33691]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/iptables.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:22 localhost python3[33734]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/iptables.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169562.090544-94717-76244530993460/source _original_basename=iptables.nft follow=False checksum=ede9860c99075946a7bc827210247aac639bc84a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:23 localhost python3[33764]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/iptables.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:59:23 localhost python3[33782]: ansible-ansible.legacy.command Invoked with _raw_params=nft -j list ruleset _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:59:24 localhost python3[33831]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:25 localhost python3[33874]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169564.1447756-94939-95358746339809/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:25 localhost python3[33936]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-update-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:26 localhost python3[33979]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-update-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169565.2306175-95144-200375717447321/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:26 localhost python3[34041]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-flushes.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:27 localhost python3[34084]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-flushes.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169566.3346567-95295-137723432084762/source mode=None follow=False _original_basename=flush-chain.j2 checksum=e8e7b8db0d61a7fe393441cc91613f470eb34a6e backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:27 localhost python3[34146]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-chains.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:28 localhost python3[34189]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-chains.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169567.3955643-95443-156580325979483/source mode=None follow=False _original_basename=chains.j2 checksum=e60ee651f5014e83924f4e901ecc8e25b1906610 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:29 localhost python3[34251]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-rules.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:30 localhost python3[34294]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-rules.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169568.4742908-95570-257384130561301/source mode=None follow=False _original_basename=ruleset.j2 checksum=f3487dfc0a90bd6214637cfa4d839c408ea37185 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:30 localhost python3[34324]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-chains.nft /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft /etc/nftables/tripleo-jumps.nft | nft -c -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:59:31 localhost python3[34389]: ansible-ansible.builtin.blockinfile Invoked with path=/etc/sysconfig/nftables.conf backup=False validate=nft -c -f %s block=include "/etc/nftables/iptables.nft"#012include "/etc/nftables/tripleo-chains.nft"#012include "/etc/nftables/tripleo-rules.nft"#012include "/etc/nftables/tripleo-jumps.nft"#012 state=present marker=# {mark} ANSIBLE MANAGED BLOCK create=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:32 localhost python3[34406]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/tripleo-chains.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:59:32 localhost python3[34423]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft | nft -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 03:59:32 localhost python3[34442]: ansible-file Invoked with mode=0750 path=/var/log/containers/ceilometer setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:33 localhost python3[34458]: ansible-seboolean Invoked with name=virt_sandbox_use_netlink persistent=True state=True ignore_selinux_state=False Oct 11 03:59:34 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=8 res=1 Oct 11 03:59:34 localhost python3[34479]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:34 localhost python3[34495]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/cinder-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:35 localhost python3[34511]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/cinder(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Oct 11 03:59:35 localhost kernel: SELinux: Converting 2717 SID table entries... Oct 11 03:59:36 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 03:59:36 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 03:59:36 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 03:59:36 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 03:59:36 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 03:59:36 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 03:59:36 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 03:59:36 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=9 res=1 Oct 11 03:59:36 localhost python3[34532]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:36 localhost python3[34548]: ansible-file Invoked with path=/var/lib/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:37 localhost python3[34564]: ansible-file Invoked with path=/var/lib/tripleo-config/ceph state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:37 localhost python3[34580]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:38 localhost python3[34596]: ansible-ansible.legacy.dnf Invoked with name=['lvm2'] state=latest allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 03:59:41 localhost python3[34613]: ansible-ansible.legacy.command Invoked with creates=/var/lib/cinder/cinder-volumes _raw_params=dd if=/dev/zero of=/var/lib/cinder/cinder-volumes bs=1 count=0 seek=20480M _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Oct 11 03:59:41 localhost python3[34630]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=exit_code=0#012existing_device=$(losetup -j /var/lib/cinder/cinder-volumes -l -n -O NAME)#012if [[ -z "${existing_device}" ]]; then#012 losetup -f /var/lib/cinder/cinder-volumes --show#012 exit_code=2#012else#012 echo ${existing_device%$'\n'*}#012fi#012exit ${exit_code} _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Oct 11 03:59:41 localhost kernel: loop: module loaded Oct 11 03:59:41 localhost kernel: loop0: detected capacity change from 0 to 41943040 Oct 11 03:59:41 localhost python3[34655]: ansible-community.general.lvg Invoked with pvs=['/dev/loop0'] state=present vg=cinder-volumes pesize=4 pv_options= pvresize=False vg_options= force=False Oct 11 03:59:42 localhost lvm[34659]: PV /dev/loop0 not used. Oct 11 03:59:42 localhost lvm[34661]: PV /dev/loop0 online, VG cinder-volumes is complete. Oct 11 03:59:42 localhost systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Oct 11 03:59:42 localhost lvm[34663]: 0 logical volume(s) in volume group "cinder-volumes" now active Oct 11 03:59:42 localhost systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Oct 11 03:59:42 localhost python3[34711]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/cinder-lvm-losetup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:43 localhost python3[34754]: ansible-ansible.legacy.copy Invoked with dest=/etc/systemd/system/cinder-lvm-losetup.service src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169582.35298-96526-80375875309105/source _original_basename=tmp8gg93x8i follow=False checksum=b96c2f9cc51ddf9c35f8cfb4cbac820751f42aef backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:43 localhost python3[34784]: ansible-systemd Invoked with daemon_reload=True enabled=True name=cinder-lvm-losetup daemon_reexec=False scope=system no_block=False state=None force=None masked=None Oct 11 03:59:43 localhost systemd[1]: Reloading. Oct 11 03:59:43 localhost systemd-rc-local-generator[34812]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:59:43 localhost systemd-sysv-generator[34815]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:59:43 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:59:43 localhost systemd[1]: Reloading. Oct 11 03:59:44 localhost systemd-sysv-generator[34851]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 03:59:44 localhost systemd-rc-local-generator[34848]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 03:59:44 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 03:59:44 localhost python3[34874]: ansible-file Invoked with mode=0750 path=/var/log/containers/collectd setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:44 localhost python3[34890]: ansible-file Invoked with mode=0755 path=/var/lib/container-user-scripts/ setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:45 localhost python3[34906]: ansible-file Invoked with mode=0750 path=/var/log/containers/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:45 localhost python3[34922]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:46 localhost python3[34938]: ansible-file Invoked with path=/var/lib/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:46 localhost python3[34954]: ansible-file Invoked with mode=0750 path=/var/log/containers/haproxy setype=var_log_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:46 localhost python3[34970]: ansible-file Invoked with path=/var/lib/haproxy setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:52 localhost python3[35116]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:52 localhost python3[35132]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:52 localhost python3[35148]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:53 localhost python3[35164]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api-cfn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:53 localhost python3[35180]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:53 localhost python3[35196]: ansible-file Invoked with mode=0750 path=/var/log/containers/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:54 localhost python3[35212]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:54 localhost python3[35228]: ansible-file Invoked with path=/var/www setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:54 localhost python3[35244]: ansible-file Invoked with mode=01777 path=/var/tmp/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 03:59:55 localhost python3[35292]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/var-tmp-horizon.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 03:59:55 localhost python3[35335]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/var-tmp-horizon.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169595.0732825-97414-129979703721599/source _original_basename=tmpo7icry7x follow=False checksum=804a78abbf39204f4c8abd5e4269fa10d8cb9df3 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 03:59:56 localhost python3[35365]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Oct 11 03:59:57 localhost kernel: SELinux: Converting 2721 SID table entries... Oct 11 03:59:57 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 03:59:57 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 03:59:57 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 03:59:57 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 03:59:57 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 03:59:57 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 03:59:57 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 03:59:57 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=10 res=1 Oct 11 03:59:57 localhost python3[35387]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/target(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Oct 11 03:59:58 localhost kernel: SELinux: Converting 2721 SID table entries... Oct 11 03:59:58 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 03:59:58 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 03:59:58 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 03:59:58 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 03:59:58 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 03:59:58 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 03:59:58 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 03:59:58 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=11 res=1 Oct 11 03:59:59 localhost python3[35408]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Oct 11 03:59:59 localhost kernel: SELinux: Converting 2721 SID table entries... Oct 11 03:59:59 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 03:59:59 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 03:59:59 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 03:59:59 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 03:59:59 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 03:59:59 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 03:59:59 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 04:00:00 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=12 res=1 Oct 11 04:00:00 localhost python3[35429]: ansible-file Invoked with path=/etc/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:00 localhost python3[35445]: ansible-file Invoked with path=/etc/target setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:01 localhost python3[35461]: ansible-file Invoked with path=/var/lib/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:01 localhost python3[35477]: ansible-stat Invoked with path=/lib/systemd/system/iscsid.socket follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 04:00:01 localhost python3[35493]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-enabled --quiet iscsi.service _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:00:02 localhost python3[35510]: ansible-ansible.legacy.dnf Invoked with name=['dracut-config-generic'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 04:00:09 localhost python3[35527]: ansible-file Invoked with path=/etc/modules-load.d state=directory mode=493 owner=root group=root setype=etc_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:09 localhost python3[35575]: ansible-ansible.legacy.stat Invoked with path=/etc/modules-load.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:00:09 localhost python3[35618]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169609.142993-98564-176663607134675/source dest=/etc/modules-load.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-modprobe.conf.j2 checksum=8021efe01721d8fa8cab46b95c00ec1be6dbb9d0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:10 localhost python3[35648]: ansible-systemd Invoked with name=systemd-modules-load.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 04:00:10 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 11 04:00:10 localhost systemd[1]: Stopped Load Kernel Modules. Oct 11 04:00:10 localhost systemd[1]: Stopping Load Kernel Modules... Oct 11 04:00:10 localhost systemd[1]: Starting Load Kernel Modules... Oct 11 04:00:10 localhost kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 11 04:00:10 localhost kernel: Bridge firewalling registered Oct 11 04:00:10 localhost systemd-modules-load[35651]: Inserted module 'br_netfilter' Oct 11 04:00:10 localhost systemd-modules-load[35651]: Module 'msr' is built in Oct 11 04:00:10 localhost systemd[1]: Finished Load Kernel Modules. Oct 11 04:00:10 localhost python3[35702]: ansible-ansible.legacy.stat Invoked with path=/etc/sysctl.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:00:11 localhost python3[35745]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169610.6351542-98646-53760320014348/source dest=/etc/sysctl.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-sysctl.conf.j2 checksum=cddb9401fdafaaf28a4a94b98448f98ae93c94c9 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:11 localhost python3[35775]: ansible-sysctl Invoked with name=fs.inotify.max_user_instances value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:12 localhost python3[35793]: ansible-sysctl Invoked with name=kernel.pid_max value=1048576 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:12 localhost python3[35811]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-arptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:12 localhost python3[35828]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-ip6tables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:13 localhost python3[35845]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-iptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:13 localhost python3[35862]: ansible-sysctl Invoked with name=net.ipv4.conf.all.rp_filter value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:13 localhost python3[35880]: ansible-sysctl Invoked with name=net.ipv4.ip_forward value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:13 localhost python3[35898]: ansible-sysctl Invoked with name=net.ipv4.ip_local_reserved_ports value=35357,49000-49001 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:14 localhost python3[35916]: ansible-sysctl Invoked with name=net.ipv4.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:14 localhost python3[35934]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh1 value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:14 localhost python3[35952]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh2 value=2048 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:15 localhost python3[35970]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh3 value=4096 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:15 localhost python3[35988]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:15 localhost python3[36005]: ansible-sysctl Invoked with name=net.ipv6.conf.all.forwarding value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:16 localhost python3[36022]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:16 localhost python3[36039]: ansible-sysctl Invoked with name=net.ipv6.conf.lo.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:16 localhost python3[36056]: ansible-sysctl Invoked with name=net.ipv6.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Oct 11 04:00:17 localhost python3[36074]: ansible-systemd Invoked with name=systemd-sysctl.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 04:00:17 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 11 04:00:17 localhost systemd[1]: Stopped Apply Kernel Variables. Oct 11 04:00:17 localhost systemd[1]: Stopping Apply Kernel Variables... Oct 11 04:00:17 localhost systemd[1]: Starting Apply Kernel Variables... Oct 11 04:00:17 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 11 04:00:17 localhost systemd[1]: Finished Apply Kernel Variables. Oct 11 04:00:17 localhost python3[36094]: ansible-file Invoked with mode=0750 path=/var/log/containers/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:17 localhost python3[36110]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:18 localhost python3[36126]: ansible-stat Invoked with path=/etc/openldap/certs/certs_valid follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 04:00:18 localhost python3[36142]: ansible-stat Invoked with path=/etc/openldap/certs/cert9.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 04:00:18 localhost python3[36158]: ansible-stat Invoked with path=/etc/openldap/certs/key4.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 04:00:19 localhost python3[36174]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:19 localhost python3[36190]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/manila-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:20 localhost python3[36206]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:20 localhost python3[36222]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:20 localhost python3[36238]: ansible-file Invoked with path=/var/lib/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:21 localhost python3[36254]: ansible-file Invoked with mode=0750 path=/var/log/containers/memcached setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:21 localhost python3[36270]: ansible-file Invoked with mode=0750 path=/var/log/containers/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:21 localhost python3[36286]: ansible-file Invoked with path=/var/lib/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:22 localhost python3[36302]: ansible-file Invoked with mode=0750 path=/var/log/containers/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:22 localhost python3[36318]: ansible-file Invoked with path=/var/lib/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:22 localhost python3[36334]: ansible-file Invoked with mode=0750 path=/var/log/mariadb setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:23 localhost python3[36350]: ansible-file Invoked with mode=0750 path=/var/log/containers/neutron setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:23 localhost python3[36366]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/neutron-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:23 localhost python3[36382]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:24 localhost python3[36398]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:24 localhost python3[36414]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:24 localhost python3[36430]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:25 localhost python3[36446]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-metadata setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:25 localhost python3[36462]: ansible-group Invoked with gid=107 name=qemu state=present system=False local=False non_unique=False Oct 11 04:00:25 localhost python3[36484]: ansible-user Invoked with comment=qemu user group=qemu name=qemu shell=/sbin/nologin state=present uid=107 non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005481015.ooo.test update_password=always groups=None home=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Oct 11 04:00:26 localhost python3[36508]: ansible-seboolean Invoked with name=logrotate_read_inside_containers persistent=True state=True ignore_selinux_state=False Oct 11 04:00:27 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=13 res=1 Oct 11 04:00:27 localhost python3[36589]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:27 localhost python3[36605]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:28 localhost python3[36621]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:28 localhost python3[36637]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:28 localhost python3[36685]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/neutron-cleanup follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:00:29 localhost python3[36728]: ansible-ansible.legacy.copy Invoked with dest=/usr/libexec/neutron-cleanup force=True mode=0755 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169628.5217283-99865-60670971654409/source _original_basename=tmpepajh5y2 follow=False checksum=f9cc7d1e91fbae49caa7e35eb2253bba146a73b4 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:29 localhost python3[36790]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/neutron-cleanup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:00:30 localhost python3[36833]: ansible-ansible.legacy.copy Invoked with dest=/usr/lib/systemd/system/neutron-cleanup.service force=True src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169629.4878438-99913-178142427134612/source _original_basename=tmp39t4t2lz follow=False checksum=6b6cd9f074903a28d054eb530a10c7235d0c39fc backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:30 localhost python3[36863]: ansible-ansible.legacy.systemd Invoked with enabled=True name=neutron-cleanup daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Oct 11 04:00:30 localhost systemd[1]: Reloading. Oct 11 04:00:30 localhost systemd-sysv-generator[36890]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 04:00:30 localhost systemd-rc-local-generator[36886]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 04:00:31 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 04:00:31 localhost python3[36917]: ansible-ansible.builtin.lineinfile Invoked with path=/etc/systemd/logind.conf regexp=^\s*#?\s*HandlePowerKey\s*=.* state=absent backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None line=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:31 localhost python3[36933]: ansible-ansible.builtin.lineinfile Invoked with line=HandlePowerKey=ignore path=/etc/systemd/logind.conf regexp=^#?HandlePowerKey state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:32 localhost python3[36949]: ansible-ansible.legacy.systemd Invoked with name=systemd-logind state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 04:00:32 localhost systemd[1]: Stopping User Login Management... Oct 11 04:00:32 localhost systemd[1]: systemd-logind.service: Deactivated successfully. Oct 11 04:00:32 localhost systemd[1]: Stopped User Login Management. Oct 11 04:00:32 localhost systemd[1]: Starting Load Kernel Module drm... Oct 11 04:00:32 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 11 04:00:32 localhost systemd[1]: Finished Load Kernel Module drm. Oct 11 04:00:32 localhost systemd[1]: Starting User Login Management... Oct 11 04:00:32 localhost systemd-logind[36957]: New seat seat0. Oct 11 04:00:32 localhost systemd-logind[36957]: Watching system buttons on /dev/input/event0 (Power Button) Oct 11 04:00:32 localhost systemd-logind[36957]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Oct 11 04:00:32 localhost systemd[1]: Started User Login Management. Oct 11 04:00:32 localhost systemd-logind[36957]: New session 15 of user tripleo-admin. Oct 11 04:00:32 localhost systemd-logind[36957]: New session 14 of user zuul. Oct 11 04:00:33 localhost python3[36973]: ansible-file Invoked with mode=0750 path=/var/log/containers/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:33 localhost python3[36989]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:33 localhost python3[37005]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/rabbitmq(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Oct 11 04:00:34 localhost kernel: SELinux: Converting 2721 SID table entries... Oct 11 04:00:34 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 04:00:34 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 04:00:34 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 04:00:34 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 04:00:34 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 04:00:34 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 04:00:34 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 04:00:34 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=14 res=1 Oct 11 04:00:35 localhost python3[37026]: ansible-file Invoked with path=/var/lib/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:35 localhost python3[37042]: ansible-file Invoked with mode=0750 path=/var/log/containers/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:35 localhost python3[37058]: ansible-ansible.legacy.command Invoked with _raw_params=echo 'export ERL_EPMD_ADDRESS=127.0.0.1' > /etc/rabbitmq/rabbitmq-env.conf#012echo 'export ERL_EPMD_PORT=4370' >> /etc/rabbitmq/rabbitmq-env.conf#012for pid in $(pgrep epmd --ns 1 --nslist pid); do kill $pid; done#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:00:36 localhost python3[37076]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 04:00:40 localhost python3[37093]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_interfaces'] gather_timeout=10 fact_path=/etc/ansible/facts.d Oct 11 04:00:41 localhost python3[37154]: ansible-file Invoked with path=/etc/containers/networks state=directory recurse=True mode=493 owner=root group=root force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:41 localhost python3[37170]: ansible-ansible.legacy.command Invoked with _raw_params=podman network inspect podman#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:00:41 localhost systemd[26268]: Created slice User Background Tasks Slice. Oct 11 04:00:41 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 04:00:41 localhost systemd[26268]: Starting Cleanup of User's Temporary Files and Directories... Oct 11 04:00:41 localhost systemd[26268]: Finished Cleanup of User's Temporary Files and Directories. Oct 11 04:00:42 localhost python3[37230]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/networks/podman.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:00:42 localhost python3[37273]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169641.7620451-100814-126944929329480/source dest=/etc/containers/networks/podman.json mode=0644 owner=root group=root follow=False _original_basename=podman_network_config.j2 checksum=0855f60b23c94a6cdee40d2c124f6931474c9828 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:43 localhost python3[37335]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/registries.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:00:43 localhost python3[37380]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169642.8895702-100924-167288014717423/source dest=/etc/containers/registries.conf owner=root group=root setype=etc_t mode=0644 follow=False _original_basename=registries.conf.j2 checksum=710a00cfb11a4c3eba9c028ef1984a9fea9ba83a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:44 localhost python3[37410]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=containers option=pids_limit value=4096 backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:44 localhost python3[37426]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=events_logger value="journald" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:44 localhost python3[37442]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=runtime value="crun" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:45 localhost python3[37458]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=network option=network_backend value="netavark" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:45 localhost python3[37506]: ansible-ansible.legacy.stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:00:46 localhost python3[37549]: ansible-ansible.legacy.copy Invoked with dest=/etc/sysconfig/podman_drop_in src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169645.5453727-101171-225747486171332/source _original_basename=tmpk8tcmpze follow=False checksum=0bfbc70e9a4740c9004b9947da681f723d529c83 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:46 localhost python3[37579]: ansible-file Invoked with path=/var/lib/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:46 localhost python3[37595]: ansible-file Invoked with mode=0750 path=/var/log/containers/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:47 localhost python3[37611]: ansible-file Invoked with path=/run/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:47 localhost python3[37659]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/run-redis.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:00:48 localhost python3[37702]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/run-redis.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169647.4174283-101304-249514636607241/source _original_basename=tmpjgxaxrh9 follow=False checksum=07018f7099c8edadf6a52c86069ae4e2a9407b28 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:48 localhost python3[37732]: ansible-file Invoked with mode=0750 path=/var/log/containers/rsyslog setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:48 localhost python3[37748]: ansible-file Invoked with path=/var/lib/rsyslog.container setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:49 localhost python3[37764]: ansible-ansible.legacy.dnf Invoked with name=['openssh-server'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 04:00:53 localhost python3[37813]: ansible-ansible.legacy.stat Invoked with path=/etc/ssh/sshd_config follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:00:54 localhost python3[37858]: ansible-ansible.legacy.copy Invoked with dest=/etc/ssh/sshd_config src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169653.1976771-101524-133963644321124/source validate=/usr/sbin/sshd -T -f %s mode=None follow=False _original_basename=sshd_config_block.j2 checksum=92fbff64c26224c12f8a576f9ce1a758767bd467 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:54 localhost python3[37889]: ansible-systemd Invoked with name=sshd state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 04:00:54 localhost systemd[1]: Stopping OpenSSH server daemon... Oct 11 04:00:54 localhost systemd[1]: sshd.service: Deactivated successfully. Oct 11 04:00:54 localhost systemd[1]: Stopped OpenSSH server daemon. Oct 11 04:00:54 localhost systemd[1]: Stopped target sshd-keygen.target. Oct 11 04:00:54 localhost systemd[1]: Stopping sshd-keygen.target... Oct 11 04:00:54 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 04:00:54 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 04:00:54 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 04:00:54 localhost systemd[1]: Reached target sshd-keygen.target. Oct 11 04:00:54 localhost systemd[1]: Starting OpenSSH server daemon... Oct 11 04:00:54 localhost sshd[37893]: main: sshd: ssh-rsa algorithm is disabled Oct 11 04:00:54 localhost systemd[1]: Started OpenSSH server daemon. Oct 11 04:00:55 localhost python3[37909]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:55 localhost python3[37925]: ansible-file Invoked with path=/var/log/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:55 localhost python3[37941]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:56 localhost python3[37957]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:56 localhost python3[37973]: ansible-file Invoked with path=/var/cache/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:56 localhost python3[37989]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:00:57 localhost python3[38005]: ansible-file Invoked with path=/srv/node/d1 state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:00:58 localhost python3[38021]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:00:59 localhost python3[38039]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:01:00 localhost python3[38057]: ansible-ansible.legacy.dnf Invoked with name=['chrony'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 04:01:04 localhost python3[38117]: ansible-ansible.legacy.stat Invoked with path=/etc/chrony.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:01:05 localhost python3[38162]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169664.0877888-102658-8632711911356/source dest=/etc/chrony.conf owner=root group=root mode=420 follow=False _original_basename=chrony.conf.j2 checksum=4fd4fbbb2de00c70a54478b7feb8ef8adf6a3362 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:01:06 localhost python3[38192]: ansible-ansible.legacy.systemd Invoked with enabled=True name=chronyd state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 04:01:06 localhost python3[38210]: ansible-ansible.legacy.systemd Invoked with name=chronyd state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 04:01:06 localhost chronyd[765]: chronyd exiting Oct 11 04:01:06 localhost systemd[1]: Stopping NTP client/server... Oct 11 04:01:06 localhost systemd[1]: chronyd.service: Deactivated successfully. Oct 11 04:01:06 localhost systemd[1]: Stopped NTP client/server. Oct 11 04:01:06 localhost systemd[1]: chronyd.service: Consumed 109ms CPU time, read 1.9M from disk, written 4.0K to disk. Oct 11 04:01:06 localhost systemd[1]: Starting NTP client/server... Oct 11 04:01:06 localhost chronyd[38217]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Oct 11 04:01:06 localhost chronyd[38217]: Frequency -25.940 +/- 0.135 ppm read from /var/lib/chrony/drift Oct 11 04:01:06 localhost chronyd[38217]: Loaded seccomp filter (level 2) Oct 11 04:01:06 localhost systemd[1]: Started NTP client/server. Oct 11 04:01:07 localhost python3[38266]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/chrony-online.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:01:07 localhost python3[38309]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169667.1204846-102894-74144107664088/source dest=/etc/systemd/system/chrony-online.service _original_basename=chrony-online.service follow=False checksum=d4d85e046d61f558ac7ec8178c6d529d893e81e1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:01:08 localhost python3[38339]: ansible-systemd Invoked with state=started name=chrony-online.service enabled=True daemon-reload=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 04:01:08 localhost systemd[1]: Reloading. Oct 11 04:01:08 localhost systemd-rc-local-generator[38359]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 04:01:08 localhost systemd-sysv-generator[38363]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 04:01:08 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 04:01:08 localhost systemd[1]: Reloading. Oct 11 04:01:08 localhost systemd-rc-local-generator[38404]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 04:01:08 localhost systemd-sysv-generator[38407]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 04:01:08 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 04:01:08 localhost systemd[1]: Starting chronyd online sources service... Oct 11 04:01:08 localhost chronyc[38414]: 200 OK Oct 11 04:01:08 localhost systemd[1]: chrony-online.service: Deactivated successfully. Oct 11 04:01:08 localhost systemd[1]: Finished chronyd online sources service. Oct 11 04:01:09 localhost python3[38430]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:01:09 localhost chronyd[38217]: System clock was stepped by 0.000000 seconds Oct 11 04:01:09 localhost python3[38447]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:01:11 localhost chronyd[38217]: Selected source 23.133.168.247 (pool.ntp.org) Oct 11 04:01:20 localhost python3[38464]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:01:20 localhost chronyd[38217]: System clock was stepped by -0.000005 seconds Oct 11 04:01:20 localhost python3[38481]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:01:20 localhost python3[38498]: ansible-timezone Invoked with name=UTC hwclock=None Oct 11 04:01:20 localhost systemd[1]: Starting Time & Date Service... Oct 11 04:01:20 localhost systemd[1]: Started Time & Date Service. Oct 11 04:01:21 localhost python3[38518]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:01:22 localhost python3[38535]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:01:23 localhost python3[38552]: ansible-slurp Invoked with src=/etc/tuned/active_profile Oct 11 04:01:23 localhost python3[38568]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 04:01:26 localhost python3[38584]: ansible-file Invoked with path=/var/log/containers state=directory setype=container_file_t selevel=s0 mode=488 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Oct 11 04:01:26 localhost python3[38600]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None setype=None attributes=None Oct 11 04:01:26 localhost python3[38616]: ansible-file Invoked with path=/var/lib/tripleo-config state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Oct 11 04:01:27 localhost python3[38632]: ansible-file Invoked with path=/var/lib/container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:01:27 localhost python3[38648]: ansible-file Invoked with path=/var/lib/docker-container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:01:27 localhost python3[38664]: ansible-community.general.sefcontext Invoked with target=/var/lib/container-config-scripts(/.*)? setype=container_file_t state=present ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Oct 11 04:01:28 localhost kernel: SELinux: Converting 2723 SID table entries... Oct 11 04:01:28 localhost kernel: SELinux: policy capability network_peer_controls=1 Oct 11 04:01:28 localhost kernel: SELinux: policy capability open_perms=1 Oct 11 04:01:28 localhost kernel: SELinux: policy capability extended_socket_class=1 Oct 11 04:01:28 localhost kernel: SELinux: policy capability always_check_network=0 Oct 11 04:01:28 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Oct 11 04:01:28 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 11 04:01:28 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Oct 11 04:01:29 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=15 res=1 Oct 11 04:01:29 localhost python3[38685]: ansible-file Invoked with path=/var/lib/container-config-scripts state=directory setype=container_file_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Oct 11 04:01:31 localhost python3[38822]: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-config/container-startup-config config_data={'step_0':********@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'os0Agkj03LOntIGpXqXNEwPpL', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, 'mysql_data_ownership': {'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, 'rabbitmq_bootstrap': {'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1760169090'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, 'redis_tls_proxy': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}}, 'step_2': {'cinder_api_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, 'cinder_scheduler_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, 'clustercheck': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, 'glance_init_logs': {'command': ['/bin/bash', '-c', 'chown -R glance:glance /var/log/glance'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z']}, 'heat_init_log': {'command': ['/bin/bash', '-c', 'chown -R heat:heat /var/log/heat'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/heat:/var/log/heat:z']}, 'horizon_fix_perms': {'command': ['/bin/bash', '-c', 'touch /var/log/horizon/horizon.log ; chown -R apache:apache /var/log/horizon && chmod -R a+rx /etc/openstack-dashboard'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/lib/config-data/puppet-generated/horizon/etc/openstack-dashboard:/etc/openstack-dashboard']}, 'keystone_init_log': {'command': ['/bin/bash', '-c', 'chown -R keystone:keystone /var/log/keystone'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z']}, 'manila_init_logs': {'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, 'mysql_wait_bundle': {'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,galera_ready,mysql_database,mysql_grant,mysql_user', 'include tripleo::profile::pacemaker::database::mysql_bundle'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1760169090'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/ Oct 11 04:01:31 localhost rsyslogd[758]: message too long (84240) with configured size 8096, begin of message is: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-c [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Oct 11 04:01:31 localhost python3[38838]: ansible-file Invoked with path=/var/lib/kolla/config_files state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Oct 11 04:01:32 localhost python3[38854]: ansible-file Invoked with path=/var/lib/config-data mode=493 state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Oct 11 04:01:32 localhost python3[38870]: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/config_files/ceilometer_agent_central.json': {'command': '/usr/bin/ceilometer-polling --polling-namespaces central --logfile /var/log/ceilometer/central.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_gnocchi_upgrade.json': {'command': "/usr/bin/bootstrap_host_exec ceilometer_agent_central su ceilometer -s /bin/bash -c 'for n in {1..10}; do /usr/bin/ceilometer-upgrade && exit 0 || sleep 30; done; exit 1'", 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_notification.json': {'command': '/usr/bin/ceilometer-agent-notification --logfile /var/log/ceilometer/agent-notification.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/cinder_api.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}]}, '/var/lib/kolla/config_files/cinder_api_db_sync.json': {'command': "/usr/bin/bootstrap_host_exec cinder_api su cinder -s /bin/bash -c 'cinder-manage db sync --bump-versions'", 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_backup.json': {'command': '/usr/bin/cinder-backup --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_scheduler.json': {'command': '/usr/bin/cinder-scheduler --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_volume.json': {'command': '/usr/bin/cinder-volume --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/clustercheck.json': {'command': 'bash -c $* -- eval source /etc/sysconfig/clustercheck; exec socat -T"${TRIPLEO_HEALTHCHECK_TIMEOUT:-2}" "$TRIPLEO_SOCAT_BIND" system:"grep -qPe \\"^\\\\r\\$\\" && /usr/bin/clustercheck"', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/collectd.json': {'command': '/usr/sbin/collectd -f', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/collectd.d'}], 'permissions': [{'owner': 'collectd:collectd', 'path': '/var/log/collectd', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/scripts', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/config-scripts', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api.json': {'command': '/usr/bin/glance-api --config-file /usr/share/glance/glance-api-dist.conf --config-file /etc/glance/glance-api.conf --config-file /etc/glance/glance-image-import.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/lib/glance', 'recurse': True}, {'owner': 'glance:glance', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}]}, '/var/lib/kolla/config_files/glance_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/log/glance', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api_tls_proxy.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modul Oct 11 04:01:32 localhost rsyslogd[758]: message too long (37323) with configured size 8096, begin of message is: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/conf [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Oct 11 04:01:42 localhost python3[38886]: ansible-stat Invoked with path=/etc/ipa/default.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 04:01:44 localhost python3[38902]: ansible-ipaclient_test Invoked with domain=ooo.test servers=['ipa.ooo.test'] hostname=np0005481015.ooo.test no_ntp=False force_ntpd=False no_nisdomain=False kinit_attempts=5 configure_firefox=False all_ip_addresses=False on_master=False enable_dns_updates=False realm=None ntp_servers=None ntp_pool=None nisdomain=None ca_cert_files=None firefox_dir=None ip_addresses=None Oct 11 04:01:45 localhost python3[38924]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:01:46 localhost python3[38940]: ansible-ipaclient_setup_ntp Invoked with ntp_servers=[''] ntp_pool= no_ntp=False on_master=False servers=['ipa.ooo.test'] domain=ooo.test Oct 11 04:01:46 localhost systemd[1]: Reloading. Oct 11 04:01:46 localhost systemd-rc-local-generator[38970]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 04:01:46 localhost systemd-sysv-generator[38974]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 04:01:46 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 04:01:46 localhost chronyd[38217]: chronyd exiting Oct 11 04:01:46 localhost systemd[1]: Stopping NTP client/server... Oct 11 04:01:46 localhost systemd[1]: chronyd.service: Deactivated successfully. Oct 11 04:01:46 localhost systemd[1]: Stopped NTP client/server. Oct 11 04:01:46 localhost systemd[1]: Starting NTP client/server... Oct 11 04:01:46 localhost chronyd[38990]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Oct 11 04:01:46 localhost chronyd[38990]: Frequency -25.940 +/- 0.137 ppm read from /var/lib/chrony/drift Oct 11 04:01:46 localhost chronyd[38990]: Loaded seccomp filter (level 2) Oct 11 04:01:46 localhost systemd[1]: Started NTP client/server. Oct 11 04:01:51 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Oct 11 04:01:51 localhost chronyd[38990]: Selected source 216.232.132.102 (pool.ntp.org) Oct 11 04:01:53 localhost python3[39011]: ansible-ipaclient_test_keytab Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005481015.ooo.test kdc=ipa.ooo.test kinit_attempts=5 Oct 11 04:01:55 localhost python3[39032]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/ipa-rmkeytab -k /etc/krb5.keytab -r "OOO.TEST"#012 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:01:56 localhost python3[39049]: ansible-ipaclient_set_hostname Invoked with hostname=np0005481015.ooo.test Oct 11 04:01:56 localhost systemd[1]: Starting Hostname Service... Oct 11 04:01:56 localhost systemd[1]: Started Hostname Service. Oct 11 04:01:56 localhost python3[39068]: ansible-ipaclient_temp_krb5 Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005481015.ooo.test kdc=ipa.ooo.test on_master=False Oct 11 04:01:57 localhost python3[39089]: ansible-ipaclient_join Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005481015.ooo.test force_join=False password=NOT_LOGGING_PARAMETER kinit_attempts=5 krb_name=/tmp/tmp_d7l_ue3 principal=None keytab=None admin_keytab=None ca_cert_file=None debug=None Oct 11 04:01:58 localhost python3[39089]: ansible-ipaclient_join Enrolled in IPA realm OOO.TEST Oct 11 04:01:59 localhost python3[39110]: ansible-ipaclient_ipa_conf Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005481015.ooo.test basedn=dc=ooo,dc=test Oct 11 04:02:00 localhost python3[39127]: ansible-ipaclient_setup_sssd Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005481015.ooo.test on_master=False no_ssh=False no_sshd=False no_sudo=False all_ip_addresses=False fixed_primary=False permit=False enable_dns_updates=False preserve_sssd=False no_krb5_offline_passwords=False Oct 11 04:02:00 localhost systemd-journald[617]: Field hash table of /run/log/journal/0d75598033f175d0e781a840bff83569/system.journal has a fill level at 76.0 (253 of 333 items), suggesting rotation. Oct 11 04:02:00 localhost systemd-journald[617]: /run/log/journal/0d75598033f175d0e781a840bff83569/system.journal: Journal header limits reached or header out-of-date, rotating. Oct 11 04:02:00 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 04:02:00 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 04:02:00 localhost python3[39145]: ansible-ipaclient_api Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST hostname=np0005481015.ooo.test krb_name=/tmp/tmp_d7l_ue3 debug=False Oct 11 04:02:03 localhost python3[39174]: ansible-ipaclient_setup_nss Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005481015.ooo.test subject_base=O=OOO.TEST principal=admin mkhomedir=False ca_enabled=True on_master=False dnsok=False enable_dns_updates=False all_ip_addresses=False request_cert=False preserve_sssd=False no_ssh=False no_sshd=False no_sudo=False fixed_primary=False permit=False no_krb5_offline_passwords=False no_dns_sshfp=False nosssd_files={} krb_name=/tmp/tmp_d7l_ue3 ip_addresses=None Oct 11 04:02:07 localhost systemd[1]: Starting System Security Services Daemon... Oct 11 04:02:07 localhost sssd[39209]: Starting up Oct 11 04:02:07 localhost sssd_be[39210]: Starting up Oct 11 04:02:07 localhost sssd_ssh[39213]: Starting up Oct 11 04:02:07 localhost sssd_sudo[39214]: Starting up Oct 11 04:02:07 localhost sssd_nss[39211]: Starting up Oct 11 04:02:07 localhost sssd_pam[39212]: Starting up Oct 11 04:02:07 localhost sssd_pac[39215]: Starting up Oct 11 04:02:07 localhost systemd[1]: Started System Security Services Daemon. Oct 11 04:02:07 localhost systemd[1]: Reloading. Oct 11 04:02:08 localhost systemd-rc-local-generator[39240]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 04:02:08 localhost systemd-sysv-generator[39245]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 04:02:08 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 04:02:09 localhost python3[39270]: ansible-ipaclient_setup_ssh Invoked with servers=['ipa.ooo.test'] sssd=True no_ssh=False ssh_trust_dns=False no_sshd=False Oct 11 04:02:09 localhost systemd[1]: Stopping OpenSSH server daemon... Oct 11 04:02:09 localhost systemd[1]: sshd.service: Deactivated successfully. Oct 11 04:02:09 localhost systemd[1]: Stopped OpenSSH server daemon. Oct 11 04:02:09 localhost systemd[1]: Stopped target sshd-keygen.target. Oct 11 04:02:09 localhost systemd[1]: Stopping sshd-keygen.target... Oct 11 04:02:09 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 04:02:09 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 04:02:09 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Oct 11 04:02:09 localhost systemd[1]: Reached target sshd-keygen.target. Oct 11 04:02:09 localhost systemd[1]: Starting OpenSSH server daemon... Oct 11 04:02:09 localhost sshd[39275]: main: sshd: ssh-rsa algorithm is disabled Oct 11 04:02:09 localhost systemd[1]: Started OpenSSH server daemon. Oct 11 04:02:09 localhost python3[39292]: ansible-ipaclient_setup_automount Invoked with servers=['ipa.ooo.test'] sssd=True automount_location=None Oct 11 04:02:10 localhost python3[39309]: ansible-ipaclient_setup_nis Invoked with domain=ooo.test nisdomain=None Oct 11 04:02:11 localhost systemd[1]: Reloading. Oct 11 04:02:11 localhost systemd-rc-local-generator[39335]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 04:02:11 localhost systemd-sysv-generator[39340]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 04:02:11 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 04:02:11 localhost systemd[1]: nis-domainname.service: Deactivated successfully. Oct 11 04:02:11 localhost systemd[1]: Stopped Read and set NIS domainname from /etc/sysconfig/network. Oct 11 04:02:11 localhost systemd[1]: Stopping Read and set NIS domainname from /etc/sysconfig/network... Oct 11 04:02:11 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Oct 11 04:02:11 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Oct 11 04:02:11 localhost python3[39369]: ansible-ansible.builtin.file Invoked with path=/tmp/tmp_d7l_ue3 state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:02:12 localhost python3[39385]: ansible-ipaclient_setup_krb5 Invoked with realm=OOO.TEST domain=ooo.test servers=['ipa.ooo.test'] kdc=ipa.ooo.test dnsok=False client_domain=ooo.test hostname=np0005481015.ooo.test sssd=True force=True Oct 11 04:02:13 localhost python3[39406]: ansible-ipaclient_setup_certmonger Invoked with realm=OOO.TEST hostname=np0005481015.ooo.test subject_base=O=OOO.TEST ca_enabled=True request_cert=False Oct 11 04:02:13 localhost python3[39425]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:02:14 localhost python3[39441]: ansible-ansible.builtin.file Invoked with path=/tmp/tmp_d7l_ue3 state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:02:14 localhost python3[39457]: ansible-ansible.builtin.file Invoked with path=/tmp/tmp_d7l_ue3.ipabkp state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:02:15 localhost python3[39473]: ansible-systemd Invoked with daemon_reload=True name=certmonger.service state=restarted daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 04:02:15 localhost systemd[1]: Reloading. Oct 11 04:02:15 localhost systemd-rc-local-generator[39500]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 04:02:15 localhost systemd-sysv-generator[39504]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 04:02:15 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 04:02:15 localhost systemd[1]: Starting Certificate monitoring and PKI enrollment... Oct 11 04:02:15 localhost certmonger[39512]: 2025-10-11 08:02:15 [39512] Changing to root directory. Oct 11 04:02:15 localhost certmonger[39512]: 2025-10-11 08:02:15 [39512] Obtaining system lock. Oct 11 04:02:15 localhost systemd[1]: Started Certificate monitoring and PKI enrollment. Oct 11 04:02:15 localhost certmonger[39513]: 2025-10-11 08:02:15 [39513] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:15 localhost certmonger[39514]: 2025-10-11 08:02:15 [39514] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:15 localhost certmonger[39515]: 2025-10-11 08:02:15 [39515] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:15 localhost certmonger[39516]: 2025-10-11 08:02:15 [39516] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:15 localhost certmonger[39517]: 2025-10-11 08:02:15 [39517] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:15 localhost certmonger[39518]: 2025-10-11 08:02:15 [39518] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:15 localhost certmonger[39519]: 2025-10-11 08:02:15 [39519] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:15 localhost certmonger[39520]: 2025-10-11 08:02:15 [39520] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:15 localhost certmonger[39521]: 2025-10-11 08:02:15 [39521] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Oct 11 04:02:15 localhost certmonger[39522]: 2025-10-11 08:02:15 [39522] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Oct 11 04:02:15 localhost certmonger[39523]: 2025-10-11 08:02:15 [39523] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Oct 11 04:02:15 localhost certmonger[39524]: 2025-10-11 08:02:15 [39524] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Oct 11 04:02:15 localhost certmonger[39525]: 2025-10-11 08:02:15 [39525] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Oct 11 04:02:15 localhost certmonger[39526]: 2025-10-11 08:02:15 [39526] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Oct 11 04:02:15 localhost certmonger[39527]: 2025-10-11 08:02:15 [39527] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Oct 11 04:02:15 localhost certmonger[39528]: 2025-10-11 08:02:15 [39528] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Oct 11 04:02:15 localhost certmonger[39529]: 2025-10-11 08:02:15 [39529] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Oct 11 04:02:15 localhost certmonger[39530]: 2025-10-11 08:02:15 [39530] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Oct 11 04:02:15 localhost certmonger[39531]: 2025-10-11 08:02:15 [39531] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Oct 11 04:02:15 localhost certmonger[39532]: 2025-10-11 08:02:15 [39532] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Oct 11 04:02:15 localhost certmonger[39533]: 2025-10-11 08:02:15 [39533] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Oct 11 04:02:15 localhost certmonger[39534]: 2025-10-11 08:02:15 [39534] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Oct 11 04:02:15 localhost certmonger[39535]: 2025-10-11 08:02:15 [39535] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Oct 11 04:02:15 localhost certmonger[39536]: 2025-10-11 08:02:15 [39536] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Oct 11 04:02:15 localhost certmonger[39512]: 2025-10-11 08:02:15 [39512] No hooks set for ca-pre-save command. Oct 11 04:02:15 localhost certmonger[39512]: 2025-10-11 08:02:15 [39512] No hooks set for ca-post-save command. Oct 11 04:02:15 localhost certmonger[39539]: 2025-10-11 08:02:15 [39539] Certificate "Local Signing Authority" valid for 31535999s. Oct 11 04:02:15 localhost certmonger[39512]: 2025-10-11 08:02:15 [39512] No hooks set for ca-pre-save command. Oct 11 04:02:15 localhost certmonger[39512]: 2025-10-11 08:02:15 [39512] No hooks set for ca-post-save command. Oct 11 04:02:15 localhost certmonger[39542]: 2025-10-11 08:02:15 [39542] Certificate "OOO.TEST IPA CA" valid for 631150987s. Oct 11 04:02:25 localhost python3[39591]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/config_step.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Oct 11 04:02:25 localhost python3[39634]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/config_step.json force=True mode=0600 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1760169744.7283595-106144-117452339670710/source _original_basename=tmp4h04zhb5 follow=False checksum=dfdcc7695edd230e7a2c06fc7b739bfa56506d8f backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:02:25 localhost python3[39664]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_1 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Oct 11 04:02:26 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 11 04:02:28 localhost python3[39789]: ansible-file Invoked with path=/var/lib/container-puppet state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Oct 11 04:02:30 localhost python3[39910]: ansible-container_puppet_config Invoked with update_config_hash_only=True no_archive=True check_mode=False config_vol_prefix=/var/lib/config-data debug=False net_host=True puppet_config= short_hostname= step=6 Oct 11 04:02:32 localhost python3[39926]: ansible-file Invoked with path=/etc/pki/tls/certs/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Oct 11 04:02:33 localhost python3[39942]: ansible-file Invoked with path=/etc/pki/tls/private/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Oct 11 04:02:33 localhost python3[39958]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 04:02:34 localhost python3[39978]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 04:02:37 localhost python3[39995]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 04:02:40 localhost python3[40012]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:02:41 localhost python3[40028]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:02:41 localhost python3[40044]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 04:02:41 localhost systemd[1]: Reloading. Oct 11 04:02:41 localhost systemd-sysv-generator[40079]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Oct 11 04:02:41 localhost systemd-rc-local-generator[40075]: /etc/rc.d/rc.local is not marked executable, skipping. Oct 11 04:02:41 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 11 04:02:42 localhost python3[40099]: ansible-certificate_request Invoked with name=httpd-ctlplane dns=['np0005481015.ctlplane.ooo.test'] principal=['HTTP/np0005481015.ctlplane.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-ctlplane.crt /etc/pki/tls/certs/httpd/httpd-ctlplane.crt#012cp /etc/pki/tls/private/httpd-ctlplane.key /etc/pki/tls/private/httpd/httpd-ctlplane.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 04:02:42 localhost certmonger[39512]: 2025-10-11 08:02:42 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:42 localhost certmonger[39512]: 2025-10-11 08:02:42 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:42 localhost certmonger[39512]: 2025-10-11 08:02:42 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:42 localhost certmonger[39512]: 2025-10-11 08:02:42 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:42 localhost certmonger[39512]: 2025-10-11 08:02:42 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:42 localhost certmonger[39512]: 2025-10-11 08:02:42 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:42 localhost certmonger[39512]: 2025-10-11 08:02:42 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:42 localhost certmonger[39512]: 2025-10-11 08:02:42 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:42 localhost certmonger[39512]: 2025-10-11 08:02:42 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:42 localhost certmonger[39512]: 2025-10-11 08:02:42 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:42 localhost certmonger[39512]: 2025-10-11 08:02:42 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:42 localhost certmonger[39512]: 2025-10-11 08:02:42 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:42 localhost certmonger[39512]: 2025-10-11 08:02:42 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:42 localhost certmonger[39512]: 2025-10-11 08:02:42 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:42 localhost certmonger[39512]: 2025-10-11 08:02:42 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:43 localhost certmonger[40109]: 2025-10-11 08:02:43 [40109] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481015.ctlplane.ooo.test" for child. Oct 11 04:02:43 localhost certmonger[40109]: 2025-10-11 08:02:43 [40109] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481015.ctlplane.ooo.test Oct 11 04:02:43 localhost certmonger[40109]: " for child. Oct 11 04:02:43 localhost certmonger[40109]: 2025-10-11 08:02:43 [40109] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005481015.ctlplane.ooo.test@OOO.TEST Oct 11 04:02:43 localhost certmonger[40109]: " for child. Oct 11 04:02:43 localhost certmonger[40109]: 2025-10-11 08:02:43 [40109] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 04:02:43 localhost certmonger[40109]: 2025-10-11 08:02:43 [40109] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 04:02:43 localhost certmonger[40109]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NDgxMDE1LmN0bHBsYW5lLm9v Oct 11 04:02:43 localhost certmonger[40109]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6YgnafB3HiMw Oct 11 04:02:43 localhost certmonger[40109]: FDqluhKL5194nBKRbiHXYlbtQPLOt0J5n+lG33rJsNUoUz5xvfh/SAyqdeSeVVCM Oct 11 04:02:43 localhost certmonger[40109]: iO19XVHCl0IB89bzZKGy0ZF/AoRt9fq3jNHWGKMYuSuxVubFGah5ewqD4Ob8SQ9g Oct 11 04:02:43 localhost certmonger[40109]: QJP8fZMRFrC9fPdrTTYIxl955FJI0ufR1kZVpJpAavNY3UBKNg7ef8WQuDwyG2YM Oct 11 04:02:43 localhost certmonger[40109]: Mxo8Wa+VFzzr+uM+AbZO4dh+jEEsWP1/Mj5H+erJlkcq3ywx0ne74znOcDce4oGM Oct 11 04:02:43 localhost certmonger[40109]: 5l3F6YXMr1Vhcb2rRqABu7hbVO8jpEqm7J6HVdY7CK/aOdnM0un9aKqKdj7lvoeA Oct 11 04:02:43 localhost certmonger[40109]: rm3qIE4wtQIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAwADEA Oct 11 04:02:43 localhost certmonger[40109]: MQAwADgAMAAyADQAMjCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Oct 11 04:02:43 localhost certmonger[40109]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU0ODEwMTUuY3RscGxhbmUub29vLnRlc3Sg Oct 11 04:02:43 localhost certmonger[40109]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28u Oct 11 04:02:43 localhost certmonger[40109]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Oct 11 04:02:43 localhost certmonger[40109]: oSgwJhsESFRUUBsebnAwMDA1NDgxMDE1LmN0bHBsYW5lLm9vby50ZXN0MB0GA1Ud Oct 11 04:02:43 localhost certmonger[40109]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Oct 11 04:02:43 localhost certmonger[40109]: BBQpNipbr7PXS/6nOp2T6wbADTb4xDANBgkqhkiG9w0BAQsFAAOCAQEASZ2V3/5H Oct 11 04:02:43 localhost certmonger[40109]: dglkZD+ouu42pHGocSCE8TpyuNx9fVMMAgFPip3pF58TXdzLO11/QrPDb2ln1nSN Oct 11 04:02:43 localhost certmonger[40109]: cHcScJaURIj9rpl67+fZwUgA3IAsKG8q2KyvMb1sujWkdcUAqHbsrnr9dzUmi5GB Oct 11 04:02:43 localhost certmonger[40109]: H0o/Ycn9qxwDwWDDPRaj5AMf8+O3CMTI5Vvvv2a+TjWwzgeWu676DKMmHf37e6+b Oct 11 04:02:43 localhost certmonger[40109]: NME0nvuesMNLh4OPFt8brSODJPDWsCK0RUpZ9isqZEr1RmLfmjCKfnmglv+Z9uuJ Oct 11 04:02:43 localhost certmonger[40109]: uLnZ/lHrBVA/pvQ4NoRYKsJGODEU8Br+1DXmgN96zFBmkl4+JxTqDKv2On7OhFfY Oct 11 04:02:43 localhost certmonger[40109]: Cme3PRE3TwI39w== Oct 11 04:02:43 localhost certmonger[40109]: -----END CERTIFICATE REQUEST----- Oct 11 04:02:43 localhost certmonger[40109]: " for child. Oct 11 04:02:43 localhost certmonger[40109]: 2025-10-11 08:02:43 [40109] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDpiCdp8HceIzAUOqW6EovnX3icEpFuIddiVu1A8s63Qnmf6Ubfesmw1ShTPnG9+H9IDKp15J5VUIyI7X1dUcKXQgHz1vNkobLRkX8ChG31+reM0dYYoxi5K7FW5sUZqHl7CoPg5vxJD2BAk/x9kxEWsL1892tNNgjGX3nkUkjS59HWRlWkmkBq81jdQEo2Dt5/xZC4PDIbZgwzGjxZr5UXPOv64z4Btk7h2H6MQSxY/X8yPkf56smWRyrfLDHSd7vjOc5wNx7igYzmXcXphcyvVWFxvatGoAG7uFtU7yOkSqbsnodV1jsIr9o52czS6f1oqop2PuW+h4CubeogTjC1AgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAc/YMTakA/lWyOjL9GJauCD24egqfleFUJ4hnP4WXljNdyB1y92Gee90pe4kkR6NbpI0BqFcpGu1nFrkENC/eMk1Fyc6kAKix5HXhFBFGURqNg9Tp4GViThLNRG/ErIGw/VFhh/5gaL1+khphxggIwB8KcrfzzjAUIWjRowpQfHWdlIK+Qb7u4w+qZcPYFQfq9oTJPzQYdb6aWONuur5Yb71NP/NydFdNAz2BoHOCaTCC6COSP29G/41K8kooy2v4vXkcbGwz1FsZOiBuyGhB/l9wVye6AscBmrmjufwh+/p8GX+Aa2pqngJBQgY/C3sQBf5+OujIppIbSgukn8FzXA==" for child. Oct 11 04:02:43 localhost certmonger[40109]: 2025-10-11 08:02:43 [40109] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6YgnafB3HiMwFDqluhKL5194nBKRbiHXYlbtQPLOt0J5n+lG33rJsNUoUz5xvfh/SAyqdeSeVVCMiO19XVHCl0IB89bzZKGy0ZF/AoRt9fq3jNHWGKMYuSuxVubFGah5ewqD4Ob8SQ9gQJP8fZMRFrC9fPdrTTYIxl955FJI0ufR1kZVpJpAavNY3UBKNg7ef8WQuDwyG2YMMxo8Wa+VFzzr+uM+AbZO4dh+jEEsWP1/Mj5H+erJlkcq3ywx0ne74znOcDce4oGM5l3F6YXMr1Vhcb2rRqABu7hbVO8jpEqm7J6HVdY7CK/aOdnM0un9aKqKdj7lvoeArm3qIE4wtQIDAQAB" for child. Oct 11 04:02:43 localhost certmonger[40109]: 2025-10-11 08:02:43 [40109] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 04:02:43 localhost certmonger[40109]: 2025-10-11 08:02:43 [40109] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 04:02:43 localhost certmonger[40109]: 2025-10-11 08:02:43 [40109] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 04:02:43 localhost certmonger[40109]: 2025-10-11 08:02:43 [40109] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:43 localhost certmonger[40109]: 2025-10-11 08:02:43 [40109] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:43 localhost certmonger[40109]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 04:02:43 localhost certmonger[40109]: Certificate: "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" Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Certificate submission still ongoing. Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Certificate submission attempt complete. Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Child status = 0. Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Child output: Oct 11 04:02:43 localhost certmonger[39512]: "-----BEGIN CERTIFICATE----- Oct 11 04:02:43 localhost certmonger[39512]: MIIFSTCCA7GgAwIBAgIBCzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:43 localhost certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:43 localhost certmonger[39512]: MDI0M1oXDTI3MTAxMjA4MDI0M1owPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Oct 11 04:02:43 localhost certmonger[39512]: BAMMHm5wMDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Oct 11 04:02:43 localhost certmonger[39512]: AQEBBQADggEPADCCAQoCggEBAOmIJ2nwdx4jMBQ6pboSi+dfeJwSkW4h12JW7UDy Oct 11 04:02:43 localhost certmonger[39512]: zrdCeZ/pRt96ybDVKFM+cb34f0gMqnXknlVQjIjtfV1RwpdCAfPW82ShstGRfwKE Oct 11 04:02:43 localhost certmonger[39512]: bfX6t4zR1hijGLkrsVbmxRmoeXsKg+Dm/EkPYECT/H2TERawvXz3a002CMZfeeRS Oct 11 04:02:43 localhost certmonger[39512]: SNLn0dZGVaSaQGrzWN1ASjYO3n/FkLg8MhtmDDMaPFmvlRc86/rjPgG2TuHYfoxB Oct 11 04:02:43 localhost certmonger[39512]: LFj9fzI+R/nqyZZHKt8sMdJ3u+M5znA3HuKBjOZdxemFzK9VYXG9q0agAbu4W1Tv Oct 11 04:02:43 localhost certmonger[39512]: I6RKpuyeh1XWOwiv2jnZzNLp/WiqinY+5b6HgK5t6iBOMLUCAwEAAaOCAd0wggHZ Oct 11 04:02:43 localhost certmonger[39512]: MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4w Oct 11 04:02:43 localhost certmonger[39512]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Oct 11 04:02:43 localhost certmonger[39512]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Oct 11 04:02:43 localhost certmonger[39512]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Oct 11 04:02:43 localhost certmonger[39512]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Oct 11 04:02:43 localhost certmonger[39512]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFPwOfgZheQfUetGYn0TNAqZkBar7 Oct 11 04:02:43 localhost certmonger[39512]: MIG2BgNVHREEga4wgauCHm5wMDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdKA8 Oct 11 04:02:43 localhost certmonger[39512]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NDgxMDE1LmN0bHBsYW5lLm9vby50 Oct 11 04:02:43 localhost certmonger[39512]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Oct 11 04:02:43 localhost certmonger[39512]: KDAmGwRIVFRQGx5ucDAwMDU0ODEwMTUuY3RscGxhbmUub29vLnRlc3QwDQYJKoZI Oct 11 04:02:43 localhost certmonger[39512]: hvcNAQELBQADggGBAGZkxEoKnC2Per3BPvKImZjpSL/WIAnVrx3cy/XzPv92vUX4 Oct 11 04:02:43 localhost certmonger[39512]: VWoebaQcFWbUrmLuHk5HJlB0s4Q4Gzh7xr4CPQCY2aF5rvTPbrybYW5ZNCS3N6F3 Oct 11 04:02:43 localhost certmonger[39512]: K21vvajhE/Uj0aVwIXpg5P6b59wcp9UHU1F6bfq52QFzS28buyW4ulCvEI4NW88e Oct 11 04:02:43 localhost certmonger[39512]: GqRrEEqbIaaKBPAy8+XA6It8VymduzmKkoAPXVGvgaGaDA+znfUK4AhnqVUMQkED Oct 11 04:02:43 localhost certmonger[39512]: S0AduzhbtfB3SkgdupoATA01c0tK3RPMtBK4pqB66tVLba6mXR5RsHepBtOpxGWb Oct 11 04:02:43 localhost certmonger[39512]: e4INRDSeEfSVnYryarKkHKFmDNxPCzBIUcYosMMhIMwdD6Q50XdETw9CEdue896u Oct 11 04:02:43 localhost certmonger[39512]: N9PxmiBauL7Xp7VQxQ6ARC/Z622eFoC5A6hPqa7UqMkl9lNLn3WbCkMKu6+Ng9/E Oct 11 04:02:43 localhost certmonger[39512]: zxGfq7GLTIBY6GlsiyuSU5UDUCH5ZqKOrudlcVjXSqJAf/vLYvKXkPEXnRl6fW6j Oct 11 04:02:43 localhost certmonger[39512]: 2XnY8cyhwldvH+J5IQ== Oct 11 04:02:43 localhost certmonger[39512]: -----END CERTIFICATE----- Oct 11 04:02:43 localhost certmonger[39512]: " Oct 11 04:02:43 localhost certmonger[40111]: 2025-10-11 08:02:43 [40111] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 04:02:43 localhost certmonger[40111]: MIIFSTCCA7GgAwIBAgIBCzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:43 localhost certmonger[40111]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:43 localhost certmonger[40111]: MDI0M1oXDTI3MTAxMjA4MDI0M1owPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Oct 11 04:02:43 localhost certmonger[40111]: BAMMHm5wMDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Oct 11 04:02:43 localhost certmonger[40111]: AQEBBQADggEPADCCAQoCggEBAOmIJ2nwdx4jMBQ6pboSi+dfeJwSkW4h12JW7UDy Oct 11 04:02:43 localhost certmonger[40111]: zrdCeZ/pRt96ybDVKFM+cb34f0gMqnXknlVQjIjtfV1RwpdCAfPW82ShstGRfwKE Oct 11 04:02:43 localhost certmonger[40111]: bfX6t4zR1hijGLkrsVbmxRmoeXsKg+Dm/EkPYECT/H2TERawvXz3a002CMZfeeRS Oct 11 04:02:43 localhost certmonger[40111]: SNLn0dZGVaSaQGrzWN1ASjYO3n/FkLg8MhtmDDMaPFmvlRc86/rjPgG2TuHYfoxB Oct 11 04:02:43 localhost certmonger[40111]: LFj9fzI+R/nqyZZHKt8sMdJ3u+M5znA3HuKBjOZdxemFzK9VYXG9q0agAbu4W1Tv Oct 11 04:02:43 localhost certmonger[40111]: I6RKpuyeh1XWOwiv2jnZzNLp/WiqinY+5b6HgK5t6iBOMLUCAwEAAaOCAd0wggHZ Oct 11 04:02:43 localhost certmonger[40111]: MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4w Oct 11 04:02:43 localhost certmonger[40111]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Oct 11 04:02:43 localhost certmonger[40111]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Oct 11 04:02:43 localhost certmonger[40111]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Oct 11 04:02:43 localhost certmonger[40111]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Oct 11 04:02:43 localhost certmonger[40111]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFPwOfgZheQfUetGYn0TNAqZkBar7 Oct 11 04:02:43 localhost certmonger[40111]: MIG2BgNVHREEga4wgauCHm5wMDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdKA8 Oct 11 04:02:43 localhost certmonger[40111]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NDgxMDE1LmN0bHBsYW5lLm9vby50 Oct 11 04:02:43 localhost certmonger[40111]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Oct 11 04:02:43 localhost certmonger[40111]: KDAmGwRIVFRQGx5ucDAwMDU0ODEwMTUuY3RscGxhbmUub29vLnRlc3QwDQYJKoZI Oct 11 04:02:43 localhost certmonger[40111]: hvcNAQELBQADggGBAGZkxEoKnC2Per3BPvKImZjpSL/WIAnVrx3cy/XzPv92vUX4 Oct 11 04:02:43 localhost certmonger[40111]: VWoebaQcFWbUrmLuHk5HJlB0s4Q4Gzh7xr4CPQCY2aF5rvTPbrybYW5ZNCS3N6F3 Oct 11 04:02:43 localhost certmonger[40111]: K21vvajhE/Uj0aVwIXpg5P6b59wcp9UHU1F6bfq52QFzS28buyW4ulCvEI4NW88e Oct 11 04:02:43 localhost certmonger[40111]: GqRrEEqbIaaKBPAy8+XA6It8VymduzmKkoAPXVGvgaGaDA+znfUK4AhnqVUMQkED Oct 11 04:02:43 localhost certmonger[40111]: S0AduzhbtfB3SkgdupoATA01c0tK3RPMtBK4pqB66tVLba6mXR5RsHepBtOpxGWb Oct 11 04:02:43 localhost certmonger[40111]: e4INRDSeEfSVnYryarKkHKFmDNxPCzBIUcYosMMhIMwdD6Q50XdETw9CEdue896u Oct 11 04:02:43 localhost certmonger[40111]: N9PxmiBauL7Xp7VQxQ6ARC/Z622eFoC5A6hPqa7UqMkl9lNLn3WbCkMKu6+Ng9/E Oct 11 04:02:43 localhost certmonger[40111]: zxGfq7GLTIBY6GlsiyuSU5UDUCH5ZqKOrudlcVjXSqJAf/vLYvKXkPEXnRl6fW6j Oct 11 04:02:43 localhost certmonger[40111]: 2XnY8cyhwldvH+J5IQ== Oct 11 04:02:43 localhost certmonger[40111]: -----END CERTIFICATE----- Oct 11 04:02:43 localhost certmonger[40111]: ". Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Certificate submission still ongoing. Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Certificate submission postprocessing complete. Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Child status = 0. Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Child output: Oct 11 04:02:43 localhost certmonger[39512]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n2XnY8cyhwldvH+J5IQ==\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 04:02:43 localhost certmonger[39512]: " Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 04:02:43 localhost certmonger[39512]: MIIFSTCCA7GgAwIBAgIBCzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:43 localhost certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:43 localhost certmonger[39512]: MDI0M1oXDTI3MTAxMjA4MDI0M1owPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Oct 11 04:02:43 localhost certmonger[39512]: BAMMHm5wMDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Oct 11 04:02:43 localhost certmonger[39512]: AQEBBQADggEPADCCAQoCggEBAOmIJ2nwdx4jMBQ6pboSi+dfeJwSkW4h12JW7UDy Oct 11 04:02:43 localhost certmonger[39512]: zrdCeZ/pRt96ybDVKFM+cb34f0gMqnXknlVQjIjtfV1RwpdCAfPW82ShstGRfwKE Oct 11 04:02:43 localhost certmonger[39512]: bfX6t4zR1hijGLkrsVbmxRmoeXsKg+Dm/EkPYECT/H2TERawvXz3a002CMZfeeRS Oct 11 04:02:43 localhost certmonger[39512]: SNLn0dZGVaSaQGrzWN1ASjYO3n/FkLg8MhtmDDMaPFmvlRc86/rjPgG2TuHYfoxB Oct 11 04:02:43 localhost certmonger[39512]: LFj9fzI+R/nqyZZHKt8sMdJ3u+M5znA3HuKBjOZdxemFzK9VYXG9q0agAbu4W1Tv Oct 11 04:02:43 localhost certmonger[39512]: I6RKpuyeh1XWOwiv2jnZzNLp/WiqinY+5b6HgK5t6iBOMLUCAwEAAaOCAd0wggHZ Oct 11 04:02:43 localhost certmonger[39512]: MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4w Oct 11 04:02:43 localhost certmonger[39512]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Oct 11 04:02:43 localhost certmonger[39512]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Oct 11 04:02:43 localhost certmonger[39512]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Oct 11 04:02:43 localhost certmonger[39512]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Oct 11 04:02:43 localhost certmonger[39512]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFPwOfgZheQfUetGYn0TNAqZkBar7 Oct 11 04:02:43 localhost certmonger[39512]: MIG2BgNVHREEga4wgauCHm5wMDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdKA8 Oct 11 04:02:43 localhost certmonger[39512]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NDgxMDE1LmN0bHBsYW5lLm9vby50 Oct 11 04:02:43 localhost certmonger[39512]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Oct 11 04:02:43 localhost certmonger[39512]: KDAmGwRIVFRQGx5ucDAwMDU0ODEwMTUuY3RscGxhbmUub29vLnRlc3QwDQYJKoZI Oct 11 04:02:43 localhost certmonger[39512]: hvcNAQELBQADggGBAGZkxEoKnC2Per3BPvKImZjpSL/WIAnVrx3cy/XzPv92vUX4 Oct 11 04:02:43 localhost certmonger[39512]: VWoebaQcFWbUrmLuHk5HJlB0s4Q4Gzh7xr4CPQCY2aF5rvTPbrybYW5ZNCS3N6F3 Oct 11 04:02:43 localhost certmonger[39512]: K21vvajhE/Uj0aVwIXpg5P6b59wcp9UHU1F6bfq52QFzS28buyW4ulCvEI4NW88e Oct 11 04:02:43 localhost certmonger[39512]: GqRrEEqbIaaKBPAy8+XA6It8VymduzmKkoAPXVGvgaGaDA+znfUK4AhnqVUMQkED Oct 11 04:02:43 localhost certmonger[39512]: S0AduzhbtfB3SkgdupoATA01c0tK3RPMtBK4pqB66tVLba6mXR5RsHepBtOpxGWb Oct 11 04:02:43 localhost certmonger[39512]: e4INRDSeEfSVnYryarKkHKFmDNxPCzBIUcYosMMhIMwdD6Q50XdETw9CEdue896u Oct 11 04:02:43 localhost certmonger[39512]: N9PxmiBauL7Xp7VQxQ6ARC/Z622eFoC5A6hPqa7UqMkl9lNLn3WbCkMKu6+Ng9/E Oct 11 04:02:43 localhost certmonger[39512]: zxGfq7GLTIBY6GlsiyuSU5UDUCH5ZqKOrudlcVjXSqJAf/vLYvKXkPEXnRl6fW6j Oct 11 04:02:43 localhost certmonger[39512]: 2XnY8cyhwldvH+J5IQ== Oct 11 04:02:43 localhost certmonger[39512]: -----END CERTIFICATE----- Oct 11 04:02:43 localhost certmonger[39512]: ". Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Certificate issued (0 chain certificates, 0 roots). Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] No hooks set for pre-save command. Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:43 localhost certmonger[40119]: Certificate in file "/etc/pki/tls/certs/httpd-ctlplane.crt" issued by CA and saved. Oct 11 04:02:43 localhost certmonger[39512]: 2025-10-11 08:02:43 [39512] Wrote to /var/lib/certmonger/requests/20251011080242 Oct 11 04:02:43 localhost systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Oct 11 04:02:43 localhost systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Oct 11 04:02:44 localhost python3[40138]: ansible-certificate_request Invoked with name=httpd-storage dns=['np0005481015.storage.ooo.test'] principal=['HTTP/np0005481015.storage.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage.crt /etc/pki/tls/certs/httpd/httpd-storage.crt#012cp /etc/pki/tls/private/httpd-storage.key /etc/pki/tls/private/httpd/httpd-storage.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 04:02:44 localhost systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Oct 11 04:02:44 localhost systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[40156]: 2025-10-11 08:02:44 [40156] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481015.storage.ooo.test" for child. Oct 11 04:02:44 localhost certmonger[40156]: 2025-10-11 08:02:44 [40156] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481015.storage.ooo.test Oct 11 04:02:44 localhost certmonger[40156]: " for child. Oct 11 04:02:44 localhost certmonger[40156]: 2025-10-11 08:02:44 [40156] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005481015.storage.ooo.test@OOO.TEST Oct 11 04:02:44 localhost certmonger[40156]: " for child. Oct 11 04:02:44 localhost certmonger[40156]: 2025-10-11 08:02:44 [40156] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 04:02:44 localhost certmonger[40156]: 2025-10-11 08:02:44 [40156] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 04:02:44 localhost certmonger[40156]: MIIDwjCCAqoCAQAwKDEmMCQGA1UEAxMdbnAwMDA1NDgxMDE1LnN0b3JhZ2Uub29v Oct 11 04:02:44 localhost certmonger[40156]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDSlTtyZrr6xBQg Oct 11 04:02:44 localhost certmonger[40156]: BCEqVolAPsV7xAKNbLKrxejeIJMXhD0xBS+rXHyd5pm2HCUCp9TinpWTNsphJONc Oct 11 04:02:44 localhost certmonger[40156]: qr4bsKJl/fzmmsFQUwh+Kf1ipJ4M5OhXb11U4NZn0vkM8pJlR0EFks1Aoyp1X32o Oct 11 04:02:44 localhost certmonger[40156]: Ohk1yWG6kIEF9uGrWP9fD6ViVGZDwGAEZqtQmzS52bnpiRerDZlUpPOWP1Ybe25H Oct 11 04:02:44 localhost certmonger[40156]: j/y0fr8YwCq3zTSmskZQgeXKOoCjXbB/e7SQJ+pM2KvrOd645gR9vYGU+q1maHiu Oct 11 04:02:44 localhost certmonger[40156]: +LDFHgctc7Fi0/kEstnpOlOxFilIl6dckSWDvumM2fgmPGjF74FxiZiFsUFfM9BK Oct 11 04:02:44 localhost certmonger[40156]: RYmOHEjrAgMBAAGgggFTMCsGCSqGSIb3DQEJFDEeHhwAMgAwADIANQAxADAAMQAx Oct 11 04:02:44 localhost certmonger[40156]: ADAAOAAwADIANAA0MIIBIgYJKoZIhvcNAQkOMYIBEzCCAQ8wCwYDVR0PBAQDAgWg Oct 11 04:02:44 localhost certmonger[40156]: MIGzBgNVHREEgaswgaiCHW5wMDAwNTQ4MTAxNS5zdG9yYWdlLm9vby50ZXN0oDsG Oct 11 04:02:44 localhost certmonger[40156]: CisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU0ODEwMTUuc3RvcmFnZS5vb28udGVz Oct 11 04:02:44 localhost certmonger[40156]: dEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5URVNUoTAwLqADAgEBoScw Oct 11 04:02:44 localhost certmonger[40156]: JRsESFRUUBsdbnAwMDA1NDgxMDE1LnN0b3JhZ2Uub29vLnRlc3QwHQYDVR0lBBYw Oct 11 04:02:44 localhost certmonger[40156]: FAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFE8G Oct 11 04:02:44 localhost certmonger[40156]: Q6Ea4HotVz0IIFAhfJwJOO0YMA0GCSqGSIb3DQEBCwUAA4IBAQBd8B8q3qQfCAvP Oct 11 04:02:44 localhost certmonger[40156]: ta8rxIQ/H/ULzPIM0gZ60/yMK4RW7Z63z1El+LjvV579TGO+Jv87sMf5nkb85CvF Oct 11 04:02:44 localhost certmonger[40156]: 5oVZ6xpiW0GYO09Dl+EHwZJq2lV2UgfdLkJDL/fc5tvE4luXALzfISBFUzto0K9i Oct 11 04:02:44 localhost certmonger[40156]: 32K4LSOedwtgBeul+YI+9XmTzUdXsuCJML7iEDGJO4S/5HNqHTOUCJO4r41WZgWk Oct 11 04:02:44 localhost certmonger[40156]: umxUJc7axgpWBHWCccVa8SWbzQSZjbk1ksSmIB6V6b7yhS6dOYenaYVyEwuws5j0 Oct 11 04:02:44 localhost certmonger[40156]: tihQVgaZ+KMdE7P0Rssw55zCuVhNZXEkdIIF/Rli94RLL6ci2i61oS7AybLZ8wSv Oct 11 04:02:44 localhost certmonger[40156]: lljvUlhr Oct 11 04:02:44 localhost certmonger[40156]: -----END CERTIFICATE REQUEST----- Oct 11 04:02:44 localhost certmonger[40156]: " for child. Oct 11 04:02:44 localhost certmonger[40156]: 2025-10-11 08:02:44 [40156] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDSlTtyZrr6xBQgBCEqVolAPsV7xAKNbLKrxejeIJMXhD0xBS+rXHyd5pm2HCUCp9TinpWTNsphJONcqr4bsKJl/fzmmsFQUwh+Kf1ipJ4M5OhXb11U4NZn0vkM8pJlR0EFks1Aoyp1X32oOhk1yWG6kIEF9uGrWP9fD6ViVGZDwGAEZqtQmzS52bnpiRerDZlUpPOWP1Ybe25Hj/y0fr8YwCq3zTSmskZQgeXKOoCjXbB/e7SQJ+pM2KvrOd645gR9vYGU+q1maHiu+LDFHgctc7Fi0/kEstnpOlOxFilIl6dckSWDvumM2fgmPGjF74FxiZiFsUFfM9BKRYmOHEjrAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAjEc3wUiRxNAoBWhOwuW9XxxsaHG6j3YPhoNy5cllUlrqG0MJm4tar+TQUmvZzXMrHuU8UUMDB32wHFfsVyQEDOd7lNBgsl1NdQQwA0zufChaTm9rqFv/LxtiOkt14edDk72tPrYA3BVLBHSBE8Kh0SefBmtDLRzyTp7yt9b7YG9YjkMaz9RjXCaDFsiaoq0l6ilVO6EpFapxB2uueKwSS9P8xPiw4pv9NGej+o/9PeccLODxrGl/Vaa3uFyReeNjqei0J0oYLT3HQKqksHk52kNT2iZto8GZwezNsEZw6WTws/VS4kR/jhy9WZZluf7McNTeMOhQdIuzDnoLHmK8xg==" for child. Oct 11 04:02:44 localhost certmonger[40156]: 2025-10-11 08:02:44 [40156] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0pU7cma6+sQUIAQhKlaJQD7Fe8QCjWyyq8Xo3iCTF4Q9MQUvq1x8neaZthwlAqfU4p6VkzbKYSTjXKq+G7CiZf385prBUFMIfin9YqSeDOToV29dVODWZ9L5DPKSZUdBBZLNQKMqdV99qDoZNclhupCBBfbhq1j/Xw+lYlRmQ8BgBGarUJs0udm56YkXqw2ZVKTzlj9WG3tuR4/8tH6/GMAqt800prJGUIHlyjqAo12wf3u0kCfqTNir6zneuOYEfb2BlPqtZmh4rviwxR4HLXOxYtP5BLLZ6TpTsRYpSJenXJElg77pjNn4Jjxoxe+BcYmYhbFBXzPQSkWJjhxI6wIDAQAB" for child. Oct 11 04:02:44 localhost certmonger[40156]: 2025-10-11 08:02:44 [40156] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 04:02:44 localhost certmonger[40156]: 2025-10-11 08:02:44 [40156] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 04:02:44 localhost certmonger[40156]: 2025-10-11 08:02:44 [40156] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 04:02:44 localhost certmonger[40156]: 2025-10-11 08:02:44 [40156] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:44 localhost certmonger[40156]: 2025-10-11 08:02:44 [40156] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[40156]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 04:02:44 localhost certmonger[40156]: Certificate: "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" Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Certificate submission still ongoing. Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Certificate submission attempt complete. Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Child status = 0. Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Child output: Oct 11 04:02:44 localhost certmonger[39512]: "-----BEGIN CERTIFICATE----- Oct 11 04:02:44 localhost certmonger[39512]: MIIFRTCCA62gAwIBAgIBETANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:44 localhost certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:44 localhost certmonger[39512]: MDI0NFoXDTI3MTAxMjA4MDI0NFowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Oct 11 04:02:44 localhost certmonger[39512]: BAMMHW5wMDAwNTQ4MTAxNS5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Oct 11 04:02:44 localhost certmonger[39512]: AQEFAAOCAQ8AMIIBCgKCAQEA0pU7cma6+sQUIAQhKlaJQD7Fe8QCjWyyq8Xo3iCT Oct 11 04:02:44 localhost certmonger[39512]: F4Q9MQUvq1x8neaZthwlAqfU4p6VkzbKYSTjXKq+G7CiZf385prBUFMIfin9YqSe Oct 11 04:02:44 localhost certmonger[39512]: DOToV29dVODWZ9L5DPKSZUdBBZLNQKMqdV99qDoZNclhupCBBfbhq1j/Xw+lYlRm Oct 11 04:02:44 localhost certmonger[39512]: Q8BgBGarUJs0udm56YkXqw2ZVKTzlj9WG3tuR4/8tH6/GMAqt800prJGUIHlyjqA Oct 11 04:02:44 localhost certmonger[39512]: o12wf3u0kCfqTNir6zneuOYEfb2BlPqtZmh4rviwxR4HLXOxYtP5BLLZ6TpTsRYp Oct 11 04:02:44 localhost certmonger[39512]: SJenXJElg77pjNn4Jjxoxe+BcYmYhbFBXzPQSkWJjhxI6wIDAQABo4IB2jCCAdYw Oct 11 04:02:44 localhost certmonger[39512]: HwYDVR0jBBgwFoAUpmo3qgn1Gyf8p8PaklOw1w0+KGkwOgYIKwYBBQUHAQEELjAs Oct 11 04:02:44 localhost certmonger[39512]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Oct 11 04:02:44 localhost certmonger[39512]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Oct 11 04:02:44 localhost certmonger[39512]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Oct 11 04:02:44 localhost certmonger[39512]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Oct 11 04:02:44 localhost certmonger[39512]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUf4msL4b1gQqUkQ0MhwAi5AWqbBUw Oct 11 04:02:44 localhost certmonger[39512]: gbMGA1UdEQSBqzCBqIIdbnAwMDA1NDgxMDE1LnN0b3JhZ2Uub29vLnRlc3SgOwYK Oct 11 04:02:44 localhost certmonger[39512]: KwYBBAGCNxQCA6AtDCtIVFRQL25wMDAwNTQ4MTAxNS5zdG9yYWdlLm9vby50ZXN0 Oct 11 04:02:44 localhost certmonger[39512]: QE9PTy5URVNUoEoGBisGAQUCAqBAMD6gChsIT09PLlRFU1ShMDAuoAMCAQGhJzAl Oct 11 04:02:44 localhost certmonger[39512]: GwRIVFRQGx1ucDAwMDU0ODEwMTUuc3RvcmFnZS5vb28udGVzdDANBgkqhkiG9w0B Oct 11 04:02:44 localhost certmonger[39512]: AQsFAAOCAYEAaSvkV+9NHz+qSaTfDi/yUQLTxjzx9QMf7XNk5lXRvjN3vs7iQvth Oct 11 04:02:44 localhost certmonger[39512]: wleWtqLH7DmUzegEBHarvrb6WADEOE/iM0JxMc6rbz9u0gAsVNwaaf4DBHzoHbeS Oct 11 04:02:44 localhost certmonger[39512]: tYRZUq8wC2mdCw9UpJ0rhUTgDe0qG5iSrT5mtA5RYJKJZxB2PMdfvbwJlXeDhyU7 Oct 11 04:02:44 localhost certmonger[39512]: tdPqt9f7sIsOqZ0UfRn5kkbhriC+GhcaKpSbL82p/ZabcuEw4LUgXFbI/jA3zou2 Oct 11 04:02:44 localhost certmonger[39512]: L2bE9pK2QInWFNG7ffQtE7DmFYWM9FrLEr4LGFY8UhavH07XNjG355A0a8pLmEOI Oct 11 04:02:44 localhost certmonger[39512]: YIKL52YD/9CpfQAWhPgH11NzZR8SxhDXcjD6HjWhRDyHsBFlYDQQMPaBMi7KF4jT Oct 11 04:02:44 localhost certmonger[39512]: P4Nf7rev5y4H3JuKGTAEJfDSx9lPn9zcEUBU5vak1PRUlYurWPZYduqjMMLOKudT Oct 11 04:02:44 localhost certmonger[39512]: zjP7/qH60ClIDiKc+1EvVNtzcSTnxxTc8O3k/V8dBBhs4FswF5wN+3OucqhvoeKG Oct 11 04:02:44 localhost certmonger[39512]: CK72WBEJ6a8Z Oct 11 04:02:44 localhost certmonger[39512]: -----END CERTIFICATE----- Oct 11 04:02:44 localhost certmonger[39512]: " Oct 11 04:02:44 localhost certmonger[40158]: 2025-10-11 08:02:44 [40158] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 04:02:44 localhost certmonger[40158]: MIIFRTCCA62gAwIBAgIBETANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:44 localhost certmonger[40158]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:44 localhost certmonger[40158]: MDI0NFoXDTI3MTAxMjA4MDI0NFowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Oct 11 04:02:44 localhost certmonger[40158]: BAMMHW5wMDAwNTQ4MTAxNS5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Oct 11 04:02:44 localhost certmonger[40158]: AQEFAAOCAQ8AMIIBCgKCAQEA0pU7cma6+sQUIAQhKlaJQD7Fe8QCjWyyq8Xo3iCT Oct 11 04:02:44 localhost certmonger[40158]: F4Q9MQUvq1x8neaZthwlAqfU4p6VkzbKYSTjXKq+G7CiZf385prBUFMIfin9YqSe Oct 11 04:02:44 localhost certmonger[40158]: DOToV29dVODWZ9L5DPKSZUdBBZLNQKMqdV99qDoZNclhupCBBfbhq1j/Xw+lYlRm Oct 11 04:02:44 localhost certmonger[40158]: Q8BgBGarUJs0udm56YkXqw2ZVKTzlj9WG3tuR4/8tH6/GMAqt800prJGUIHlyjqA Oct 11 04:02:44 localhost certmonger[40158]: o12wf3u0kCfqTNir6zneuOYEfb2BlPqtZmh4rviwxR4HLXOxYtP5BLLZ6TpTsRYp Oct 11 04:02:44 localhost certmonger[40158]: SJenXJElg77pjNn4Jjxoxe+BcYmYhbFBXzPQSkWJjhxI6wIDAQABo4IB2jCCAdYw Oct 11 04:02:44 localhost certmonger[40158]: HwYDVR0jBBgwFoAUpmo3qgn1Gyf8p8PaklOw1w0+KGkwOgYIKwYBBQUHAQEELjAs Oct 11 04:02:44 localhost certmonger[40158]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Oct 11 04:02:44 localhost certmonger[40158]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Oct 11 04:02:44 localhost certmonger[40158]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Oct 11 04:02:44 localhost certmonger[40158]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Oct 11 04:02:44 localhost certmonger[40158]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUf4msL4b1gQqUkQ0MhwAi5AWqbBUw Oct 11 04:02:44 localhost certmonger[40158]: gbMGA1UdEQSBqzCBqIIdbnAwMDA1NDgxMDE1LnN0b3JhZ2Uub29vLnRlc3SgOwYK Oct 11 04:02:44 localhost certmonger[40158]: KwYBBAGCNxQCA6AtDCtIVFRQL25wMDAwNTQ4MTAxNS5zdG9yYWdlLm9vby50ZXN0 Oct 11 04:02:44 localhost certmonger[40158]: QE9PTy5URVNUoEoGBisGAQUCAqBAMD6gChsIT09PLlRFU1ShMDAuoAMCAQGhJzAl Oct 11 04:02:44 localhost certmonger[40158]: GwRIVFRQGx1ucDAwMDU0ODEwMTUuc3RvcmFnZS5vb28udGVzdDANBgkqhkiG9w0B Oct 11 04:02:44 localhost certmonger[40158]: AQsFAAOCAYEAaSvkV+9NHz+qSaTfDi/yUQLTxjzx9QMf7XNk5lXRvjN3vs7iQvth Oct 11 04:02:44 localhost certmonger[40158]: wleWtqLH7DmUzegEBHarvrb6WADEOE/iM0JxMc6rbz9u0gAsVNwaaf4DBHzoHbeS Oct 11 04:02:44 localhost certmonger[40158]: tYRZUq8wC2mdCw9UpJ0rhUTgDe0qG5iSrT5mtA5RYJKJZxB2PMdfvbwJlXeDhyU7 Oct 11 04:02:44 localhost certmonger[40158]: tdPqt9f7sIsOqZ0UfRn5kkbhriC+GhcaKpSbL82p/ZabcuEw4LUgXFbI/jA3zou2 Oct 11 04:02:44 localhost certmonger[40158]: L2bE9pK2QInWFNG7ffQtE7DmFYWM9FrLEr4LGFY8UhavH07XNjG355A0a8pLmEOI Oct 11 04:02:44 localhost certmonger[40158]: YIKL52YD/9CpfQAWhPgH11NzZR8SxhDXcjD6HjWhRDyHsBFlYDQQMPaBMi7KF4jT Oct 11 04:02:44 localhost certmonger[40158]: P4Nf7rev5y4H3JuKGTAEJfDSx9lPn9zcEUBU5vak1PRUlYurWPZYduqjMMLOKudT Oct 11 04:02:44 localhost certmonger[40158]: zjP7/qH60ClIDiKc+1EvVNtzcSTnxxTc8O3k/V8dBBhs4FswF5wN+3OucqhvoeKG Oct 11 04:02:44 localhost certmonger[40158]: CK72WBEJ6a8Z Oct 11 04:02:44 localhost certmonger[40158]: -----END CERTIFICATE----- Oct 11 04:02:44 localhost certmonger[40158]: ". Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Certificate submission still ongoing. Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Certificate submission postprocessing complete. Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Child status = 0. Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Child output: Oct 11 04:02:44 localhost certmonger[39512]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nCK72WBEJ6a8Z\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 04:02:44 localhost certmonger[39512]: " Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 04:02:44 localhost certmonger[39512]: MIIFRTCCA62gAwIBAgIBETANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:44 localhost certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:44 localhost certmonger[39512]: MDI0NFoXDTI3MTAxMjA4MDI0NFowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Oct 11 04:02:44 localhost certmonger[39512]: BAMMHW5wMDAwNTQ4MTAxNS5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Oct 11 04:02:44 localhost certmonger[39512]: AQEFAAOCAQ8AMIIBCgKCAQEA0pU7cma6+sQUIAQhKlaJQD7Fe8QCjWyyq8Xo3iCT Oct 11 04:02:44 localhost certmonger[39512]: F4Q9MQUvq1x8neaZthwlAqfU4p6VkzbKYSTjXKq+G7CiZf385prBUFMIfin9YqSe Oct 11 04:02:44 localhost certmonger[39512]: DOToV29dVODWZ9L5DPKSZUdBBZLNQKMqdV99qDoZNclhupCBBfbhq1j/Xw+lYlRm Oct 11 04:02:44 localhost certmonger[39512]: Q8BgBGarUJs0udm56YkXqw2ZVKTzlj9WG3tuR4/8tH6/GMAqt800prJGUIHlyjqA Oct 11 04:02:44 localhost certmonger[39512]: o12wf3u0kCfqTNir6zneuOYEfb2BlPqtZmh4rviwxR4HLXOxYtP5BLLZ6TpTsRYp Oct 11 04:02:44 localhost certmonger[39512]: SJenXJElg77pjNn4Jjxoxe+BcYmYhbFBXzPQSkWJjhxI6wIDAQABo4IB2jCCAdYw Oct 11 04:02:44 localhost certmonger[39512]: HwYDVR0jBBgwFoAUpmo3qgn1Gyf8p8PaklOw1w0+KGkwOgYIKwYBBQUHAQEELjAs Oct 11 04:02:44 localhost certmonger[39512]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Oct 11 04:02:44 localhost certmonger[39512]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Oct 11 04:02:44 localhost certmonger[39512]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Oct 11 04:02:44 localhost certmonger[39512]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Oct 11 04:02:44 localhost certmonger[39512]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUf4msL4b1gQqUkQ0MhwAi5AWqbBUw Oct 11 04:02:44 localhost certmonger[39512]: gbMGA1UdEQSBqzCBqIIdbnAwMDA1NDgxMDE1LnN0b3JhZ2Uub29vLnRlc3SgOwYK Oct 11 04:02:44 localhost certmonger[39512]: KwYBBAGCNxQCA6AtDCtIVFRQL25wMDAwNTQ4MTAxNS5zdG9yYWdlLm9vby50ZXN0 Oct 11 04:02:44 localhost certmonger[39512]: QE9PTy5URVNUoEoGBisGAQUCAqBAMD6gChsIT09PLlRFU1ShMDAuoAMCAQGhJzAl Oct 11 04:02:44 localhost certmonger[39512]: GwRIVFRQGx1ucDAwMDU0ODEwMTUuc3RvcmFnZS5vb28udGVzdDANBgkqhkiG9w0B Oct 11 04:02:44 localhost certmonger[39512]: AQsFAAOCAYEAaSvkV+9NHz+qSaTfDi/yUQLTxjzx9QMf7XNk5lXRvjN3vs7iQvth Oct 11 04:02:44 localhost certmonger[39512]: wleWtqLH7DmUzegEBHarvrb6WADEOE/iM0JxMc6rbz9u0gAsVNwaaf4DBHzoHbeS Oct 11 04:02:44 localhost certmonger[39512]: tYRZUq8wC2mdCw9UpJ0rhUTgDe0qG5iSrT5mtA5RYJKJZxB2PMdfvbwJlXeDhyU7 Oct 11 04:02:44 localhost certmonger[39512]: tdPqt9f7sIsOqZ0UfRn5kkbhriC+GhcaKpSbL82p/ZabcuEw4LUgXFbI/jA3zou2 Oct 11 04:02:44 localhost certmonger[39512]: L2bE9pK2QInWFNG7ffQtE7DmFYWM9FrLEr4LGFY8UhavH07XNjG355A0a8pLmEOI Oct 11 04:02:44 localhost certmonger[39512]: YIKL52YD/9CpfQAWhPgH11NzZR8SxhDXcjD6HjWhRDyHsBFlYDQQMPaBMi7KF4jT Oct 11 04:02:44 localhost certmonger[39512]: P4Nf7rev5y4H3JuKGTAEJfDSx9lPn9zcEUBU5vak1PRUlYurWPZYduqjMMLOKudT Oct 11 04:02:44 localhost certmonger[39512]: zjP7/qH60ClIDiKc+1EvVNtzcSTnxxTc8O3k/V8dBBhs4FswF5wN+3OucqhvoeKG Oct 11 04:02:44 localhost certmonger[39512]: CK72WBEJ6a8Z Oct 11 04:02:44 localhost certmonger[39512]: -----END CERTIFICATE----- Oct 11 04:02:44 localhost certmonger[39512]: ". Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Certificate issued (0 chain certificates, 0 roots). Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] No hooks set for pre-save command. Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:44 localhost certmonger[40166]: Certificate in file "/etc/pki/tls/certs/httpd-storage.crt" issued by CA and saved. Oct 11 04:02:44 localhost certmonger[39512]: 2025-10-11 08:02:44 [39512] Wrote to /var/lib/certmonger/requests/20251011080244 Oct 11 04:02:45 localhost auditd[725]: queue to plugins is full - dropping event Oct 11 04:02:45 localhost auditd[725]: queue to plugins is full - dropping event Oct 11 04:02:45 localhost auditd[725]: queue to plugins is full - dropping event Oct 11 04:02:45 localhost auditd[725]: queue to plugins is full - dropping event Oct 11 04:02:45 localhost auditd[725]: queue to plugins is full - dropping event Oct 11 04:02:45 localhost auditd[725]: auditd queue full reporting limit reached - ending dropped event notifications Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:45 localhost python3[40183]: ansible-certificate_request Invoked with name=httpd-storage_mgmt dns=['np0005481015.storagemgmt.ooo.test'] principal=['HTTP/np0005481015.storagemgmt.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage_mgmt.crt /etc/pki/tls/certs/httpd/httpd-storage_mgmt.crt#012cp /etc/pki/tls/private/httpd-storage_mgmt.key /etc/pki/tls/private/httpd/httpd-storage_mgmt.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:45 localhost certmonger[39512]: 2025-10-11 08:02:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[39512]: 2025-10-11 08:02:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[39512]: 2025-10-11 08:02:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[39512]: 2025-10-11 08:02:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[39512]: 2025-10-11 08:02:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[39512]: 2025-10-11 08:02:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[39512]: 2025-10-11 08:02:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[39512]: 2025-10-11 08:02:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost certmonger[39512]: 2025-10-11 08:02:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:45 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[40193]: 2025-10-11 08:02:46 [40193] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481015.storagemgmt.ooo.test" for child. Oct 11 04:02:46 localhost certmonger[40193]: 2025-10-11 08:02:46 [40193] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481015.storagemgmt.ooo.test Oct 11 04:02:46 localhost certmonger[40193]: " for child. Oct 11 04:02:46 localhost certmonger[40193]: 2025-10-11 08:02:46 [40193] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005481015.storagemgmt.ooo.test@OOO.TEST Oct 11 04:02:46 localhost certmonger[40193]: " for child. Oct 11 04:02:46 localhost certmonger[40193]: 2025-10-11 08:02:46 [40193] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 04:02:46 localhost certmonger[40193]: 2025-10-11 08:02:46 [40193] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 04:02:46 localhost certmonger[40193]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDE1LnN0b3JhZ2VtZ210 Oct 11 04:02:46 localhost certmonger[40193]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvcARCMbh Oct 11 04:02:46 localhost certmonger[40193]: hpC0Dhyj6MfEp3zD0ErDQJs37t7bn36b+ufgRF/XivT5nOf0shrpANGFwz7Vg56R Oct 11 04:02:46 localhost certmonger[40193]: IklS3iYY7wFBde7j3wwSRtb9wwMOiI7LXPvHnc9yZIJmWeIUSjygxr9MLgJLKcJC Oct 11 04:02:46 localhost certmonger[40193]: kvmjxZdAvx23AwUv0x/ia+e5OGCUpB0qNpIB385OZ4v82pGHDLARyw4Z3CGn8a6V Oct 11 04:02:46 localhost certmonger[40193]: gqOa0QOlPFOXhIKJ2pjMi4XBbUm6KYt4phqTd75wq3XkvVkDyjyN1f6eRB1R7ApK Oct 11 04:02:46 localhost certmonger[40193]: wqkVKTy/24vTNk0t5L+/wbfCCQiMA0RVtouDcWCzQCpPDU4ldXEBtPZiinhGBVru Oct 11 04:02:46 localhost certmonger[40193]: qOAQp4C75gPWvQIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 04:02:46 localhost certmonger[40193]: ADEAMQAwADgAMAAyADQANTCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Oct 11 04:02:46 localhost certmonger[40193]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU0ODEwMTUuc3RvcmFnZW1nbXQub29v Oct 11 04:02:46 localhost certmonger[40193]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTQ4MTAxNS5zdG9yYWdl Oct 11 04:02:46 localhost certmonger[40193]: bWdtdC5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Oct 11 04:02:46 localhost certmonger[40193]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NDgxMDE1LnN0b3JhZ2VtZ210Lm9v Oct 11 04:02:46 localhost certmonger[40193]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Oct 11 04:02:46 localhost certmonger[40193]: AjAAMB0GA1UdDgQWBBQh11crKkG5qter78F2zdPMPE6QPzANBgkqhkiG9w0BAQsF Oct 11 04:02:46 localhost certmonger[40193]: AAOCAQEAbnKid+1kfhvGqScsdT3wz3Ozac1ipYPyABQUzBNyo7s42VZ4IacsrMx6 Oct 11 04:02:46 localhost certmonger[40193]: rE2uEhFjuUUTapZAtMxI0HdyB23Gi44hDgXP9mpUF5Uv1Eb9fkoYVc5Pc78RYXPw Oct 11 04:02:46 localhost certmonger[40193]: ZKh8+Ul8roJX0d04VZ2EEsV+kh5HfNcMdfsoUv/GiIbInpj8olgz4pjNB8MLaOGn Oct 11 04:02:46 localhost certmonger[40193]: 6tcrdEHQIlqyH1VavZ8zE4hOMR5RqaFEJx5r9/+p5zc38c+efwM4cTJUBt1tE2T5 Oct 11 04:02:46 localhost certmonger[40193]: 1Ft41D8dwm3HKXgO0OwTdMp2/E7/DmBzc9MsRlzgPWNicGV4+eO4NnghsTgsRHEe Oct 11 04:02:46 localhost certmonger[40193]: bnCE5wkiYTMarpF/KAAdexXGL7BGtA== Oct 11 04:02:46 localhost certmonger[40193]: -----END CERTIFICATE REQUEST----- Oct 11 04:02:46 localhost certmonger[40193]: " for child. Oct 11 04:02:46 localhost certmonger[40193]: 2025-10-11 08:02:46 [40193] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC9wBEIxuGGkLQOHKPox8SnfMPQSsNAmzfu3tuffpv65+BEX9eK9Pmc5/SyGukA0YXDPtWDnpEiSVLeJhjvAUF17uPfDBJG1v3DAw6Ijstc+8edz3JkgmZZ4hRKPKDGv0wuAkspwkKS+aPFl0C/HbcDBS/TH+Jr57k4YJSkHSo2kgHfzk5ni/zakYcMsBHLDhncIafxrpWCo5rRA6U8U5eEgonamMyLhcFtSbopi3imGpN3vnCrdeS9WQPKPI3V/p5EHVHsCkrCqRUpPL/bi9M2TS3kv7/Bt8IJCIwDRFW2i4NxYLNAKk8NTiV1cQG09mKKeEYFWu6o4BCngLvmA9a9AgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAFKqi+ZvFeI+6TTE8V0Djhh1XsT1cu/PlouLj8J3kVgdsXhBdI5clyedTGcoYFURviShzWMHX7wl5fPzZFlpYUg5nSP2tElMMZ9iv+OnGF7mRdMmTlmnm/F5gS6zstGaOlI0P5FunJXV8XgMAR+hurJkJ6Ym6gBhiSi1ZLjx35ieEdhpEXuUkV9xgogJwrGXSpZvdv5xzz9NmqPB7EDjVuiE86QHxwjleL1Vo2r43GnYSNxyY+oZIWVNYN+kmFwwMQTaIlo3l2v4h7xu59SMVeJ4rsO2mju2pKL5lolBJHRh3EhKoDbtqzLjMptM04H+97wShzKKh/vCzUm4D8LyHbw==" for child. Oct 11 04:02:46 localhost certmonger[40193]: 2025-10-11 08:02:46 [40193] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvcARCMbhhpC0Dhyj6MfEp3zD0ErDQJs37t7bn36b+ufgRF/XivT5nOf0shrpANGFwz7Vg56RIklS3iYY7wFBde7j3wwSRtb9wwMOiI7LXPvHnc9yZIJmWeIUSjygxr9MLgJLKcJCkvmjxZdAvx23AwUv0x/ia+e5OGCUpB0qNpIB385OZ4v82pGHDLARyw4Z3CGn8a6VgqOa0QOlPFOXhIKJ2pjMi4XBbUm6KYt4phqTd75wq3XkvVkDyjyN1f6eRB1R7ApKwqkVKTy/24vTNk0t5L+/wbfCCQiMA0RVtouDcWCzQCpPDU4ldXEBtPZiinhGBVruqOAQp4C75gPWvQIDAQAB" for child. Oct 11 04:02:46 localhost certmonger[40193]: 2025-10-11 08:02:46 [40193] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 04:02:46 localhost certmonger[40193]: 2025-10-11 08:02:46 [40193] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 04:02:46 localhost certmonger[40193]: 2025-10-11 08:02:46 [40193] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 04:02:46 localhost certmonger[40193]: 2025-10-11 08:02:46 [40193] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:46 localhost certmonger[40193]: 2025-10-11 08:02:46 [40193] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost certmonger[40193]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost certmonger[40193]: Certificate: "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" Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Certificate submission still ongoing. Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Certificate submission attempt complete. Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Child status = 0. Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Child output: Oct 11 04:02:46 localhost certmonger[39512]: "-----BEGIN CERTIFICATE----- Oct 11 04:02:46 localhost certmonger[39512]: MIIFVTCCA72gAwIBAgIBFDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:46 localhost certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:46 localhost certmonger[39512]: MDI0NloXDTI3MTAxMjA4MDI0NlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 04:02:46 localhost certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Oct 11 04:02:46 localhost certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBAL3AEQjG4YaQtA4co+jHxKd8w9BKw0CbN+7e Oct 11 04:02:46 localhost certmonger[39512]: 259+m/rn4ERf14r0+Zzn9LIa6QDRhcM+1YOekSJJUt4mGO8BQXXu498MEkbW/cMD Oct 11 04:02:46 localhost certmonger[39512]: DoiOy1z7x53PcmSCZlniFEo8oMa/TC4CSynCQpL5o8WXQL8dtwMFL9Mf4mvnuThg Oct 11 04:02:46 localhost certmonger[39512]: lKQdKjaSAd/OTmeL/NqRhwywEcsOGdwhp/GulYKjmtEDpTxTl4SCidqYzIuFwW1J Oct 11 04:02:46 localhost certmonger[39512]: uimLeKYak3e+cKt15L1ZA8o8jdX+nkQdUewKSsKpFSk8v9uL0zZNLeS/v8G3wgkI Oct 11 04:02:46 localhost certmonger[39512]: jANEVbaLg3Fgs0AqTw1OJXVxAbT2Yop4RgVa7qjgEKeAu+YD1r0CAwEAAaOCAeYw Oct 11 04:02:46 localhost certmonger[39512]: ggHiMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 04:02:46 localhost certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 04:02:46 localhost certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 04:02:46 localhost certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 04:02:46 localhost certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 04:02:46 localhost certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFGnQJUH+m5fo9e0mV9iVRGlE Oct 11 04:02:46 localhost certmonger[39512]: KGWgMIG/BgNVHREEgbcwgbSCIW5wMDAwNTQ4MTAxNS5zdG9yYWdlbWdtdC5vb28u Oct 11 04:02:46 localhost certmonger[39512]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NDgxMDE1LnN0b3JhZ2Vt Oct 11 04:02:46 localhost certmonger[39512]: Z210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Oct 11 04:02:46 localhost certmonger[39512]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU0ODEwMTUuc3RvcmFnZW1nbXQub29v Oct 11 04:02:46 localhost certmonger[39512]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBABg1WSr3IB9k8sbpxxf9R9gYsgWxIpD0 Oct 11 04:02:46 localhost certmonger[39512]: Qgyak6RfY8sIytGxZQPMe1yZVolh/mm+aB4MrGVGi9oV+VpazqLBXLEgWE1ESJFp Oct 11 04:02:46 localhost certmonger[39512]: 49Vojc8gFpiv4IOTb0bZTwBBc7Dy0TBHoGPZukSpBjdvm2x7WR6y1HW20x7/sy86 Oct 11 04:02:46 localhost certmonger[39512]: 1sXXWpbm2nW2RK5UwlEkQ6+4zWAZppaB9Jjb82g4K1h+Eqtozlw8jUqLEndSxt4L Oct 11 04:02:46 localhost certmonger[39512]: 6RODRcyx6Pul42XXlC71Ddy06ZVGFwpvaggZYRFTXspxUhUK94bY/mRnDqmObvgY Oct 11 04:02:46 localhost certmonger[39512]: RUYPD+5BFxAQMjtho3R+0CoLVWqUxoUOSlsEWI7UmmVFAkId8lmZVsQmr7ydQJCG Oct 11 04:02:46 localhost certmonger[39512]: lnjQ8itam55mig5UyRb/E9gippaz8ElXEC/ASIRbPDog7YDk0JwWwIMlFzfIDf1Z Oct 11 04:02:46 localhost certmonger[39512]: qV3k7rb+L/cjhEslTzDK9MPBdrDNJv1MQ2Abhyiwc4HGlBLUjj/LWzGoAgDZztsY Oct 11 04:02:46 localhost certmonger[39512]: b1q0sMqzdoEUlOjyBeVgtoDM8zR3QAfoDA== Oct 11 04:02:46 localhost certmonger[39512]: -----END CERTIFICATE----- Oct 11 04:02:46 localhost certmonger[39512]: " Oct 11 04:02:46 localhost certmonger[40195]: 2025-10-11 08:02:46 [40195] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 04:02:46 localhost certmonger[40195]: MIIFVTCCA72gAwIBAgIBFDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:46 localhost certmonger[40195]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:46 localhost certmonger[40195]: MDI0NloXDTI3MTAxMjA4MDI0NlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 04:02:46 localhost certmonger[40195]: BAMMIW5wMDAwNTQ4MTAxNS5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Oct 11 04:02:46 localhost certmonger[40195]: hvcNAQEBBQADggEPADCCAQoCggEBAL3AEQjG4YaQtA4co+jHxKd8w9BKw0CbN+7e Oct 11 04:02:46 localhost certmonger[40195]: 259+m/rn4ERf14r0+Zzn9LIa6QDRhcM+1YOekSJJUt4mGO8BQXXu498MEkbW/cMD Oct 11 04:02:46 localhost certmonger[40195]: DoiOy1z7x53PcmSCZlniFEo8oMa/TC4CSynCQpL5o8WXQL8dtwMFL9Mf4mvnuThg Oct 11 04:02:46 localhost certmonger[40195]: lKQdKjaSAd/OTmeL/NqRhwywEcsOGdwhp/GulYKjmtEDpTxTl4SCidqYzIuFwW1J Oct 11 04:02:46 localhost certmonger[40195]: uimLeKYak3e+cKt15L1ZA8o8jdX+nkQdUewKSsKpFSk8v9uL0zZNLeS/v8G3wgkI Oct 11 04:02:46 localhost certmonger[40195]: jANEVbaLg3Fgs0AqTw1OJXVxAbT2Yop4RgVa7qjgEKeAu+YD1r0CAwEAAaOCAeYw Oct 11 04:02:46 localhost certmonger[40195]: ggHiMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 04:02:46 localhost certmonger[40195]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 04:02:46 localhost certmonger[40195]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 04:02:46 localhost certmonger[40195]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 04:02:46 localhost certmonger[40195]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 04:02:46 localhost certmonger[40195]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFGnQJUH+m5fo9e0mV9iVRGlE Oct 11 04:02:46 localhost certmonger[40195]: KGWgMIG/BgNVHREEgbcwgbSCIW5wMDAwNTQ4MTAxNS5zdG9yYWdlbWdtdC5vb28u Oct 11 04:02:46 localhost certmonger[40195]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NDgxMDE1LnN0b3JhZ2Vt Oct 11 04:02:46 localhost certmonger[40195]: Z210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Oct 11 04:02:46 localhost certmonger[40195]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU0ODEwMTUuc3RvcmFnZW1nbXQub29v Oct 11 04:02:46 localhost certmonger[40195]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBABg1WSr3IB9k8sbpxxf9R9gYsgWxIpD0 Oct 11 04:02:46 localhost certmonger[40195]: Qgyak6RfY8sIytGxZQPMe1yZVolh/mm+aB4MrGVGi9oV+VpazqLBXLEgWE1ESJFp Oct 11 04:02:46 localhost certmonger[40195]: 49Vojc8gFpiv4IOTb0bZTwBBc7Dy0TBHoGPZukSpBjdvm2x7WR6y1HW20x7/sy86 Oct 11 04:02:46 localhost certmonger[40195]: 1sXXWpbm2nW2RK5UwlEkQ6+4zWAZppaB9Jjb82g4K1h+Eqtozlw8jUqLEndSxt4L Oct 11 04:02:46 localhost certmonger[40195]: 6RODRcyx6Pul42XXlC71Ddy06ZVGFwpvaggZYRFTXspxUhUK94bY/mRnDqmObvgY Oct 11 04:02:46 localhost certmonger[40195]: RUYPD+5BFxAQMjtho3R+0CoLVWqUxoUOSlsEWI7UmmVFAkId8lmZVsQmr7ydQJCG Oct 11 04:02:46 localhost certmonger[40195]: lnjQ8itam55mig5UyRb/E9gippaz8ElXEC/ASIRbPDog7YDk0JwWwIMlFzfIDf1Z Oct 11 04:02:46 localhost certmonger[40195]: qV3k7rb+L/cjhEslTzDK9MPBdrDNJv1MQ2Abhyiwc4HGlBLUjj/LWzGoAgDZztsY Oct 11 04:02:46 localhost certmonger[40195]: b1q0sMqzdoEUlOjyBeVgtoDM8zR3QAfoDA== Oct 11 04:02:46 localhost certmonger[40195]: -----END CERTIFICATE----- Oct 11 04:02:46 localhost certmonger[40195]: ". Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Certificate submission still ongoing. Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Certificate submission postprocessing complete. Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Child status = 0. Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Child output: Oct 11 04:02:46 localhost certmonger[39512]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nb1q0sMqzdoEUlOjyBeVgtoDM8zR3QAfoDA==\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 04:02:46 localhost certmonger[39512]: " Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 04:02:46 localhost certmonger[39512]: MIIFVTCCA72gAwIBAgIBFDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:46 localhost certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:46 localhost certmonger[39512]: MDI0NloXDTI3MTAxMjA4MDI0NlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 04:02:46 localhost certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Oct 11 04:02:46 localhost certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBAL3AEQjG4YaQtA4co+jHxKd8w9BKw0CbN+7e Oct 11 04:02:46 localhost certmonger[39512]: 259+m/rn4ERf14r0+Zzn9LIa6QDRhcM+1YOekSJJUt4mGO8BQXXu498MEkbW/cMD Oct 11 04:02:46 localhost certmonger[39512]: DoiOy1z7x53PcmSCZlniFEo8oMa/TC4CSynCQpL5o8WXQL8dtwMFL9Mf4mvnuThg Oct 11 04:02:46 localhost certmonger[39512]: lKQdKjaSAd/OTmeL/NqRhwywEcsOGdwhp/GulYKjmtEDpTxTl4SCidqYzIuFwW1J Oct 11 04:02:46 localhost certmonger[39512]: uimLeKYak3e+cKt15L1ZA8o8jdX+nkQdUewKSsKpFSk8v9uL0zZNLeS/v8G3wgkI Oct 11 04:02:46 localhost certmonger[39512]: jANEVbaLg3Fgs0AqTw1OJXVxAbT2Yop4RgVa7qjgEKeAu+YD1r0CAwEAAaOCAeYw Oct 11 04:02:46 localhost certmonger[39512]: ggHiMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 04:02:46 localhost certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 04:02:46 localhost certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 04:02:46 localhost certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 04:02:46 localhost certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 04:02:46 localhost certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFGnQJUH+m5fo9e0mV9iVRGlE Oct 11 04:02:46 localhost certmonger[39512]: KGWgMIG/BgNVHREEgbcwgbSCIW5wMDAwNTQ4MTAxNS5zdG9yYWdlbWdtdC5vb28u Oct 11 04:02:46 localhost certmonger[39512]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NDgxMDE1LnN0b3JhZ2Vt Oct 11 04:02:46 localhost certmonger[39512]: Z210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Oct 11 04:02:46 localhost certmonger[39512]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU0ODEwMTUuc3RvcmFnZW1nbXQub29v Oct 11 04:02:46 localhost certmonger[39512]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBABg1WSr3IB9k8sbpxxf9R9gYsgWxIpD0 Oct 11 04:02:46 localhost certmonger[39512]: Qgyak6RfY8sIytGxZQPMe1yZVolh/mm+aB4MrGVGi9oV+VpazqLBXLEgWE1ESJFp Oct 11 04:02:46 localhost certmonger[39512]: 49Vojc8gFpiv4IOTb0bZTwBBc7Dy0TBHoGPZukSpBjdvm2x7WR6y1HW20x7/sy86 Oct 11 04:02:46 localhost certmonger[39512]: 1sXXWpbm2nW2RK5UwlEkQ6+4zWAZppaB9Jjb82g4K1h+Eqtozlw8jUqLEndSxt4L Oct 11 04:02:46 localhost certmonger[39512]: 6RODRcyx6Pul42XXlC71Ddy06ZVGFwpvaggZYRFTXspxUhUK94bY/mRnDqmObvgY Oct 11 04:02:46 localhost certmonger[39512]: RUYPD+5BFxAQMjtho3R+0CoLVWqUxoUOSlsEWI7UmmVFAkId8lmZVsQmr7ydQJCG Oct 11 04:02:46 localhost certmonger[39512]: lnjQ8itam55mig5UyRb/E9gippaz8ElXEC/ASIRbPDog7YDk0JwWwIMlFzfIDf1Z Oct 11 04:02:46 localhost certmonger[39512]: qV3k7rb+L/cjhEslTzDK9MPBdrDNJv1MQ2Abhyiwc4HGlBLUjj/LWzGoAgDZztsY Oct 11 04:02:46 localhost certmonger[39512]: b1q0sMqzdoEUlOjyBeVgtoDM8zR3QAfoDA== Oct 11 04:02:46 localhost certmonger[39512]: -----END CERTIFICATE----- Oct 11 04:02:46 localhost certmonger[39512]: ". Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Certificate issued (0 chain certificates, 0 roots). Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] No hooks set for pre-save command. Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:46 localhost certmonger[40203]: Certificate in file "/etc/pki/tls/certs/httpd-storage_mgmt.crt" issued by CA and saved. Oct 11 04:02:46 localhost certmonger[39512]: 2025-10-11 08:02:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080245 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost python3[40219]: ansible-certificate_request Invoked with name=httpd-internal_api dns=['np0005481015.internalapi.ooo.test'] principal=['HTTP/np0005481015.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-internal_api.crt /etc/pki/tls/certs/httpd/httpd-internal_api.crt#012cp /etc/pki/tls/private/httpd-internal_api.key /etc/pki/tls/private/httpd/httpd-internal_api.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:47 localhost certmonger[39512]: 2025-10-11 08:02:47 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[39512]: 2025-10-11 08:02:47 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[39512]: 2025-10-11 08:02:47 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[39512]: 2025-10-11 08:02:47 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[39512]: 2025-10-11 08:02:47 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[39512]: 2025-10-11 08:02:47 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[39512]: 2025-10-11 08:02:47 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[39512]: 2025-10-11 08:02:47 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost certmonger[39512]: 2025-10-11 08:02:47 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:47 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost sedispatch[727]: AVC Message regarding setroubleshoot, ignoring message Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost certmonger[40229]: 2025-10-11 08:02:48 [40229] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481015.internalapi.ooo.test" for child. Oct 11 04:02:48 localhost certmonger[40229]: 2025-10-11 08:02:48 [40229] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481015.internalapi.ooo.test Oct 11 04:02:48 localhost certmonger[40229]: " for child. Oct 11 04:02:48 localhost certmonger[40229]: 2025-10-11 08:02:48 [40229] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005481015.internalapi.ooo.test@OOO.TEST Oct 11 04:02:48 localhost certmonger[40229]: " for child. Oct 11 04:02:48 localhost certmonger[40229]: 2025-10-11 08:02:48 [40229] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 04:02:48 localhost certmonger[40229]: 2025-10-11 08:02:48 [40229] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 04:02:48 localhost certmonger[40229]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDE1LmludGVybmFsYXBp Oct 11 04:02:48 localhost certmonger[40229]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0eDRSqe9 Oct 11 04:02:48 localhost certmonger[40229]: 9vOGajiRB72XENvapukbhA76zAgME2FHfC6eDQWEyAzTTxaDaMFMwU0jgTHh/bDy Oct 11 04:02:48 localhost certmonger[40229]: cYapapIkYi0jmo/tosFiakjMzdt8o4pkwKiNTRq1XRLxEtoly6v/RPPQom/4EPI9 Oct 11 04:02:48 localhost certmonger[40229]: FL2e3lU8jvpdQ5llQHYiU89lrDgTwITuZ1NCqSjxX7x3F3B29QksdgM8qSj9n4c7 Oct 11 04:02:48 localhost certmonger[40229]: I8mn62gM9Jz38qOZnO6NCWDbRXIkitxTb9hD8XULS60+6CEtr9GLKCLjypRiSIDq Oct 11 04:02:48 localhost certmonger[40229]: V2W8obRgsuKku/o4AJPGDaYvYreFM12F+wmdDH/U34Rwug1vSJ2CAr8WLtoiecHd Oct 11 04:02:48 localhost certmonger[40229]: VZEn9WsZe8LGXQIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 04:02:48 localhost certmonger[40229]: ADEAMQAwADgAMAAyADQANzCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Oct 11 04:02:48 localhost certmonger[40229]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU0ODEwMTUuaW50ZXJuYWxhcGkub29v Oct 11 04:02:48 localhost certmonger[40229]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTQ4MTAxNS5pbnRlcm5h Oct 11 04:02:48 localhost certmonger[40229]: bGFwaS5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Oct 11 04:02:48 localhost certmonger[40229]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NDgxMDE1LmludGVybmFsYXBpLm9v Oct 11 04:02:48 localhost certmonger[40229]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Oct 11 04:02:48 localhost certmonger[40229]: AjAAMB0GA1UdDgQWBBQ0iD2GeEZeFEbcWaVO0ZS9lUXvTjANBgkqhkiG9w0BAQsF Oct 11 04:02:48 localhost certmonger[40229]: AAOCAQEAIyDpd1K2SykWZbkqEIPllSU44m66FEKUlVhP1qQxoW2/bCDLG8ltZtOs Oct 11 04:02:48 localhost certmonger[40229]: WQZWE/RBSV35sGgiePOiioxYRaDFEQ9qKNl/2yrPzms24AcbYYKEpSygCqDm6LiK Oct 11 04:02:48 localhost certmonger[40229]: JpiH8efZXEaXiULV9v5tyMnEm2UfwRitDFPgv9vQZ0ofI8G5uMiVg+8Gwb+D25Qx Oct 11 04:02:48 localhost certmonger[40229]: bvaN1TdF0Ggn+umt63OY0PBpVaa1kIC0vlDDjDjqgtEwUOeddIC/4EMnIAFgeQtp Oct 11 04:02:48 localhost certmonger[40229]: +j9TsuOJac4QzqYFhyDy9vfOOmXDW0RC5Rlbr071pXLhJltNqCCBogAK1+VB4sQZ Oct 11 04:02:48 localhost certmonger[40229]: pGPxppyyxum9OsVj61VTMHFYeiLZ4A== Oct 11 04:02:48 localhost certmonger[40229]: -----END CERTIFICATE REQUEST----- Oct 11 04:02:48 localhost certmonger[40229]: " for child. Oct 11 04:02:48 localhost certmonger[40229]: 2025-10-11 08:02:48 [40229] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 04:02:48 localhost certmonger[40229]: 2025-10-11 08:02:48 [40229] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0eDRSqe99vOGajiRB72XENvapukbhA76zAgME2FHfC6eDQWEyAzTTxaDaMFMwU0jgTHh/bDycYapapIkYi0jmo/tosFiakjMzdt8o4pkwKiNTRq1XRLxEtoly6v/RPPQom/4EPI9FL2e3lU8jvpdQ5llQHYiU89lrDgTwITuZ1NCqSjxX7x3F3B29QksdgM8qSj9n4c7I8mn62gM9Jz38qOZnO6NCWDbRXIkitxTb9hD8XULS60+6CEtr9GLKCLjypRiSIDqV2W8obRgsuKku/o4AJPGDaYvYreFM12F+wmdDH/U34Rwug1vSJ2CAr8WLtoiecHdVZEn9WsZe8LGXQIDAQAB" for child. Oct 11 04:02:48 localhost certmonger[40229]: 2025-10-11 08:02:48 [40229] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 04:02:48 localhost certmonger[40229]: 2025-10-11 08:02:48 [40229] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 04:02:48 localhost certmonger[40229]: 2025-10-11 08:02:48 [40229] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 04:02:48 localhost certmonger[40229]: 2025-10-11 08:02:48 [40229] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:48 localhost certmonger[40229]: 2025-10-11 08:02:48 [40229] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost certmonger[40229]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:48 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:48 localhost certmonger[40229]: Certificate: "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" Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Certificate submission still ongoing. Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Certificate submission attempt complete. Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Child status = 0. Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Child output: Oct 11 04:02:48 localhost certmonger[39512]: "-----BEGIN CERTIFICATE----- Oct 11 04:02:48 localhost certmonger[39512]: MIIFVTCCA72gAwIBAgIBFzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:48 localhost certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:48 localhost certmonger[39512]: MDI0OFoXDTI3MTAxMjA4MDI0OFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 04:02:48 localhost certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 04:02:48 localhost certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBANHg0Uqnvfbzhmo4kQe9lxDb2qbpG4QO+swI Oct 11 04:02:48 localhost certmonger[39512]: DBNhR3wung0FhMgM008Wg2jBTMFNI4Ex4f2w8nGGqWqSJGItI5qP7aLBYmpIzM3b Oct 11 04:02:48 localhost certmonger[39512]: fKOKZMCojU0atV0S8RLaJcur/0Tz0KJv+BDyPRS9nt5VPI76XUOZZUB2IlPPZaw4 Oct 11 04:02:48 localhost certmonger[39512]: E8CE7mdTQqko8V+8dxdwdvUJLHYDPKko/Z+HOyPJp+toDPSc9/KjmZzujQlg20Vy Oct 11 04:02:48 localhost certmonger[39512]: JIrcU2/YQ/F1C0utPughLa/Riygi48qUYkiA6ldlvKG0YLLipLv6OACTxg2mL2K3 Oct 11 04:02:48 localhost certmonger[39512]: hTNdhfsJnQx/1N+EcLoNb0idggK/Fi7aInnB3VWRJ/VrGXvCxl0CAwEAAaOCAeYw Oct 11 04:02:48 localhost certmonger[39512]: ggHiMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 04:02:48 localhost certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 04:02:48 localhost certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 04:02:48 localhost certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 04:02:48 localhost certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 04:02:48 localhost certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLouh6HIrM/qv2Mf5TVmkoRP Oct 11 04:02:48 localhost certmonger[39512]: HSPQMIG/BgNVHREEgbcwgbSCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 04:02:48 localhost certmonger[39512]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NDgxMDE1LmludGVybmFs Oct 11 04:02:48 localhost certmonger[39512]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Oct 11 04:02:48 localhost certmonger[39512]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU0ODEwMTUuaW50ZXJuYWxhcGkub29v Oct 11 04:02:48 localhost certmonger[39512]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAA7zJkDOfaf+jmgTIZn5i2wNw+kDKVW8 Oct 11 04:02:48 localhost certmonger[39512]: dBE0abHahe9F/XJ+g9593iUJvSu89zA2anjrf99jEHQUaC3q+wwah6b1saC10dqa Oct 11 04:02:48 localhost certmonger[39512]: EW6fu9PtMLtxci2DPRD6dbB77OBvL1QZKRBM8ZXTV9J0Mq3O9powurxCwsGwdLAu Oct 11 04:02:48 localhost certmonger[39512]: 3mh/t6vIAT/YtmXSKkAhgt3XhTLd3deLcrm8xMvouszyoKKmbHPllGStdrS9DNfz Oct 11 04:02:48 localhost certmonger[39512]: CPLvsISxQg6uP41PUUxJrAf2h8IB2gOHnACqk2OQB/smztaUdpRF9Q/YJ1QHJG3l Oct 11 04:02:48 localhost certmonger[39512]: O9ym2Eh9Z7/dQZjziSG5GBb95GMfS5nqMZvAO9ItWKs4/JsKnpbA4L6Y/yvfVyXz Oct 11 04:02:48 localhost certmonger[39512]: hJGz2ASg7FXeQKqs4KC7rhku02AbsZgMkXcki0vMtFRrcooAACsn5gYEWXkcFool Oct 11 04:02:48 localhost certmonger[39512]: UJVuFFs5KrF/nNMA8UXmxqOGiFPWf9xF4doMIFyitPrXMiQ3SeE/3Qe2f8vJRx35 Oct 11 04:02:48 localhost certmonger[39512]: rFHE9rgkl5PVHCpPZgIFU9WuUH5+dfr9Mw== Oct 11 04:02:48 localhost certmonger[39512]: -----END CERTIFICATE----- Oct 11 04:02:48 localhost certmonger[39512]: " Oct 11 04:02:48 localhost certmonger[40231]: 2025-10-11 08:02:48 [40231] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 04:02:48 localhost certmonger[40231]: MIIFVTCCA72gAwIBAgIBFzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:48 localhost certmonger[40231]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:48 localhost certmonger[40231]: MDI0OFoXDTI3MTAxMjA4MDI0OFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 04:02:48 localhost certmonger[40231]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 04:02:48 localhost certmonger[40231]: hvcNAQEBBQADggEPADCCAQoCggEBANHg0Uqnvfbzhmo4kQe9lxDb2qbpG4QO+swI Oct 11 04:02:48 localhost certmonger[40231]: DBNhR3wung0FhMgM008Wg2jBTMFNI4Ex4f2w8nGGqWqSJGItI5qP7aLBYmpIzM3b Oct 11 04:02:48 localhost certmonger[40231]: fKOKZMCojU0atV0S8RLaJcur/0Tz0KJv+BDyPRS9nt5VPI76XUOZZUB2IlPPZaw4 Oct 11 04:02:48 localhost certmonger[40231]: E8CE7mdTQqko8V+8dxdwdvUJLHYDPKko/Z+HOyPJp+toDPSc9/KjmZzujQlg20Vy Oct 11 04:02:48 localhost certmonger[40231]: JIrcU2/YQ/F1C0utPughLa/Riygi48qUYkiA6ldlvKG0YLLipLv6OACTxg2mL2K3 Oct 11 04:02:48 localhost certmonger[40231]: hTNdhfsJnQx/1N+EcLoNb0idggK/Fi7aInnB3VWRJ/VrGXvCxl0CAwEAAaOCAeYw Oct 11 04:02:48 localhost certmonger[40231]: ggHiMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 04:02:48 localhost certmonger[40231]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 04:02:48 localhost certmonger[40231]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 04:02:48 localhost certmonger[40231]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 04:02:48 localhost certmonger[40231]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 04:02:48 localhost certmonger[40231]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLouh6HIrM/qv2Mf5TVmkoRP Oct 11 04:02:48 localhost certmonger[40231]: HSPQMIG/BgNVHREEgbcwgbSCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 04:02:48 localhost certmonger[40231]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NDgxMDE1LmludGVybmFs Oct 11 04:02:48 localhost certmonger[40231]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Oct 11 04:02:48 localhost certmonger[40231]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU0ODEwMTUuaW50ZXJuYWxhcGkub29v Oct 11 04:02:48 localhost certmonger[40231]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAA7zJkDOfaf+jmgTIZn5i2wNw+kDKVW8 Oct 11 04:02:48 localhost certmonger[40231]: dBE0abHahe9F/XJ+g9593iUJvSu89zA2anjrf99jEHQUaC3q+wwah6b1saC10dqa Oct 11 04:02:48 localhost certmonger[40231]: EW6fu9PtMLtxci2DPRD6dbB77OBvL1QZKRBM8ZXTV9J0Mq3O9powurxCwsGwdLAu Oct 11 04:02:48 localhost certmonger[40231]: 3mh/t6vIAT/YtmXSKkAhgt3XhTLd3deLcrm8xMvouszyoKKmbHPllGStdrS9DNfz Oct 11 04:02:48 localhost certmonger[40231]: CPLvsISxQg6uP41PUUxJrAf2h8IB2gOHnACqk2OQB/smztaUdpRF9Q/YJ1QHJG3l Oct 11 04:02:48 localhost certmonger[40231]: O9ym2Eh9Z7/dQZjziSG5GBb95GMfS5nqMZvAO9ItWKs4/JsKnpbA4L6Y/yvfVyXz Oct 11 04:02:48 localhost certmonger[40231]: hJGz2ASg7FXeQKqs4KC7rhku02AbsZgMkXcki0vMtFRrcooAACsn5gYEWXkcFool Oct 11 04:02:48 localhost certmonger[40231]: UJVuFFs5KrF/nNMA8UXmxqOGiFPWf9xF4doMIFyitPrXMiQ3SeE/3Qe2f8vJRx35 Oct 11 04:02:48 localhost certmonger[40231]: rFHE9rgkl5PVHCpPZgIFU9WuUH5+dfr9Mw== Oct 11 04:02:48 localhost certmonger[40231]: -----END CERTIFICATE----- Oct 11 04:02:48 localhost certmonger[40231]: ". Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Certificate submission still ongoing. Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Certificate submission postprocessing complete. Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Child status = 0. Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Child output: Oct 11 04:02:48 localhost certmonger[39512]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFVTCCA72gAwIBAgIBFzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u\nVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4\nMDI0OFoXDTI3MTAxMjA4MDI0OFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV\nBAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI\nhvcNAQEBBQADggEPADCCAQoCggEBANHg0Uqnvfbzhmo4kQe9lxDb2qbpG4QO+swI\nDBNhR3wung0FhMgM008Wg2jBTMFNI4Ex4f2w8nGGqWqSJGItI5qP7aLBYmpIzM3b\nfKOKZMCojU0atV0S8RLaJcur/0Tz0KJv+BDyPRS9nt5VPI76XUOZZUB2IlPPZaw4\nE8CE7mdTQqko8V+8dxdwdvUJLHYDPKko/Z+HOyPJp+toDPSc9/KjmZzujQlg20Vy\nJIrcU2/YQ/F1C0utPughLa/Riygi48qUYkiA6ldlvKG0YLLipLv6OACTxg2mL2K3\nhTNdhfsJnQx/1N+EcLoNb0idggK/Fi7aInnB3VWRJ/VrGXvCxl0CAwEAAaOCAeYw\nggHiMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB\nBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw\nMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw\ncwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js\nL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD\nZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLouh6HIrM/qv2Mf5TVmkoRP\nHSPQMIG/BgNVHREEgbcwgbSCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u\ndGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NDgxMDE1LmludGVybmFs\nYXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh\nNDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU0ODEwMTUuaW50ZXJuYWxhcGkub29v\nLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAA7zJkDOfaf+jmgTIZn5i2wNw+kDKVW8\ndBE0abHahe9F/XJ+g9593iUJvSu89zA2anjrf99jEHQUaC3q+wwah6b1saC10dqa\nEW6fu9PtMLtxci2DPRD6dbB77OBvL1QZKRBM8ZXTV9J0Mq3O9powurxCwsGwdLAu\n3mh/t6vIAT/YtmXSKkAhgt3XhTLd3deLcrm8xMvouszyoKKmbHPllGStdrS9DNfz\nCPLvsISxQg6uP41PUUxJrAf2h8IB2gOHnACqk2OQB/smztaUdpRF9Q/YJ1QHJG3l\nO9ym2Eh9Z7/dQZjziSG5GBb95GMfS5nqMZvAO9ItWKs4/JsKnpbA4L6Y/yvfVyXz\nhJGz2ASg7FXeQKqs4KC7rhku02AbsZgMkXcki0vMtFRrcooAACsn5gYEWXkcFool\nUJVuFFs5KrF/nNMA8UXmxqOGiFPWf9xF4doMIFyitPrXMiQ3SeE/3Qe2f8vJRx35\nrFHE9rgkl5PVHCpPZgIFU9WuUH5+dfr9Mw==\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 04:02:48 localhost certmonger[39512]: " Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 04:02:48 localhost certmonger[39512]: MIIFVTCCA72gAwIBAgIBFzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:48 localhost certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:48 localhost certmonger[39512]: MDI0OFoXDTI3MTAxMjA4MDI0OFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 04:02:48 localhost certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 04:02:48 localhost certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBANHg0Uqnvfbzhmo4kQe9lxDb2qbpG4QO+swI Oct 11 04:02:48 localhost certmonger[39512]: DBNhR3wung0FhMgM008Wg2jBTMFNI4Ex4f2w8nGGqWqSJGItI5qP7aLBYmpIzM3b Oct 11 04:02:48 localhost certmonger[39512]: fKOKZMCojU0atV0S8RLaJcur/0Tz0KJv+BDyPRS9nt5VPI76XUOZZUB2IlPPZaw4 Oct 11 04:02:48 localhost certmonger[39512]: E8CE7mdTQqko8V+8dxdwdvUJLHYDPKko/Z+HOyPJp+toDPSc9/KjmZzujQlg20Vy Oct 11 04:02:48 localhost certmonger[39512]: JIrcU2/YQ/F1C0utPughLa/Riygi48qUYkiA6ldlvKG0YLLipLv6OACTxg2mL2K3 Oct 11 04:02:48 localhost certmonger[39512]: hTNdhfsJnQx/1N+EcLoNb0idggK/Fi7aInnB3VWRJ/VrGXvCxl0CAwEAAaOCAeYw Oct 11 04:02:48 localhost certmonger[39512]: ggHiMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 04:02:48 localhost certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 04:02:48 localhost certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 04:02:48 localhost certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 04:02:48 localhost certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 04:02:48 localhost certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLouh6HIrM/qv2Mf5TVmkoRP Oct 11 04:02:48 localhost certmonger[39512]: HSPQMIG/BgNVHREEgbcwgbSCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 04:02:48 localhost certmonger[39512]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NDgxMDE1LmludGVybmFs Oct 11 04:02:48 localhost certmonger[39512]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Oct 11 04:02:48 localhost certmonger[39512]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU0ODEwMTUuaW50ZXJuYWxhcGkub29v Oct 11 04:02:48 localhost certmonger[39512]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAA7zJkDOfaf+jmgTIZn5i2wNw+kDKVW8 Oct 11 04:02:48 localhost certmonger[39512]: dBE0abHahe9F/XJ+g9593iUJvSu89zA2anjrf99jEHQUaC3q+wwah6b1saC10dqa Oct 11 04:02:48 localhost certmonger[39512]: EW6fu9PtMLtxci2DPRD6dbB77OBvL1QZKRBM8ZXTV9J0Mq3O9powurxCwsGwdLAu Oct 11 04:02:48 localhost certmonger[39512]: 3mh/t6vIAT/YtmXSKkAhgt3XhTLd3deLcrm8xMvouszyoKKmbHPllGStdrS9DNfz Oct 11 04:02:48 localhost certmonger[39512]: CPLvsISxQg6uP41PUUxJrAf2h8IB2gOHnACqk2OQB/smztaUdpRF9Q/YJ1QHJG3l Oct 11 04:02:48 localhost certmonger[39512]: O9ym2Eh9Z7/dQZjziSG5GBb95GMfS5nqMZvAO9ItWKs4/JsKnpbA4L6Y/yvfVyXz Oct 11 04:02:48 localhost certmonger[39512]: hJGz2ASg7FXeQKqs4KC7rhku02AbsZgMkXcki0vMtFRrcooAACsn5gYEWXkcFool Oct 11 04:02:48 localhost certmonger[39512]: UJVuFFs5KrF/nNMA8UXmxqOGiFPWf9xF4doMIFyitPrXMiQ3SeE/3Qe2f8vJRx35 Oct 11 04:02:48 localhost certmonger[39512]: rFHE9rgkl5PVHCpPZgIFU9WuUH5+dfr9Mw== Oct 11 04:02:48 localhost certmonger[39512]: -----END CERTIFICATE----- Oct 11 04:02:48 localhost certmonger[39512]: ". Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Certificate issued (0 chain certificates, 0 roots). Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] No hooks set for pre-save command. Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:48 localhost certmonger[39512]: 2025-10-11 08:02:48 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:49 localhost certmonger[39512]: 2025-10-11 08:02:49 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:49 localhost certmonger[39512]: 2025-10-11 08:02:49 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:49 localhost certmonger[39512]: 2025-10-11 08:02:49 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost certmonger[39512]: 2025-10-11 08:02:49 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:49 localhost certmonger[39512]: 2025-10-11 08:02:49 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:49 localhost certmonger[39512]: 2025-10-11 08:02:49 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:49 localhost certmonger[39512]: 2025-10-11 08:02:49 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:49 localhost certmonger[39512]: 2025-10-11 08:02:49 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:49 localhost certmonger[39512]: 2025-10-11 08:02:49 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:49 localhost certmonger[40239]: Certificate in file "/etc/pki/tls/certs/httpd-internal_api.crt" issued by CA and saved. Oct 11 04:02:49 localhost certmonger[39512]: 2025-10-11 08:02:49 [39512] Wrote to /var/lib/certmonger/requests/20251011080247 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6692a83b-bb94-4845-879a-29ed9872facf Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7b450de5-8eab-4f5e-b369-1dfde0ada79d Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:49 localhost python3[40255]: ansible-certificate_request Invoked with name=httpd-external dns=['np0005481015.external.ooo.test'] principal=['HTTP/np0005481015.external.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-external.crt /etc/pki/tls/certs/httpd/httpd-external.crt#012cp /etc/pki/tls/private/httpd-external.key /etc/pki/tls/private/httpd/httpd-external.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost certmonger[39512]: 2025-10-11 08:02:49 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:49 localhost certmonger[39512]: 2025-10-11 08:02:49 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:49 localhost certmonger[39512]: 2025-10-11 08:02:49 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:49 localhost certmonger[39512]: 2025-10-11 08:02:49 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:49 localhost certmonger[39512]: 2025-10-11 08:02:49 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:49 localhost certmonger[39512]: 2025-10-11 08:02:49 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:49 localhost certmonger[39512]: 2025-10-11 08:02:49 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:49 localhost certmonger[39512]: 2025-10-11 08:02:49 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:49 localhost certmonger[39512]: 2025-10-11 08:02:49 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:49 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ecec4f6f-8b83-4d58-827b-e2544272d219 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 407aa926-ebe9-4a0b-ac32-9f52f4aed920 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 407aa926-ebe9-4a0b-ac32-9f52f4aed920 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 67e6be48-70aa-43c2-8e2b-0616a054f552 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 67e6be48-70aa-43c2-8e2b-0616a054f552 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 55857ced-23f7-4df3-9c21-8a7985e5ba1d Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6692a83b-bb94-4845-879a-29ed9872facf Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a1aaca04-87f0-4969-89bf-da708db6005a Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost certmonger[40265]: 2025-10-11 08:02:50 [40265] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481015.external.ooo.test" for child. Oct 11 04:02:50 localhost certmonger[40265]: 2025-10-11 08:02:50 [40265] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481015.external.ooo.test Oct 11 04:02:50 localhost certmonger[40265]: " for child. Oct 11 04:02:50 localhost certmonger[40265]: 2025-10-11 08:02:50 [40265] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005481015.external.ooo.test@OOO.TEST Oct 11 04:02:50 localhost certmonger[40265]: " for child. Oct 11 04:02:50 localhost certmonger[40265]: 2025-10-11 08:02:50 [40265] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 04:02:50 localhost certmonger[40265]: 2025-10-11 08:02:50 [40265] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 04:02:50 localhost certmonger[40265]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NDgxMDE1LmV4dGVybmFsLm9v Oct 11 04:02:50 localhost certmonger[40265]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvnfe0UA//i6I Oct 11 04:02:50 localhost certmonger[40265]: 9QNu8cz1EwNCt2rw9xA1t8Bmjf7uH5A5v2VuPF3whSeIU1SVI69sqE3BtlD3gOk+ Oct 11 04:02:50 localhost certmonger[40265]: AjuFQOw2Er3WPRijB7c1miunaNPLJvTQVQES/SDzdCHPAOCrkeSAADN1ZiAiWV3D Oct 11 04:02:50 localhost certmonger[40265]: PQaTk8P6NzUOkntM6r8uCgoUplgEHKU0erghDLfa/+yOkm6ujdBcfhs20imShrwL Oct 11 04:02:50 localhost certmonger[40265]: 45a3fLof9cSLXHFg9flS+gekBewSmQbBm1/M5jKHzSc2F9T6Ftb8x4ofeCamlhB7 Oct 11 04:02:50 localhost certmonger[40265]: gp6IZX06T2kOMVr7m7zftJZ1RHQ1bs470org6r8tfeSgOPT/QxMH7HX8as/YTZ8X Oct 11 04:02:50 localhost certmonger[40265]: dFDLu/RC/wIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAwADEA Oct 11 04:02:50 localhost certmonger[40265]: MQAwADgAMAAyADQAOTCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Oct 11 04:02:50 localhost certmonger[40265]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU0ODEwMTUuZXh0ZXJuYWwub29vLnRlc3Sg Oct 11 04:02:50 localhost certmonger[40265]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTQ4MTAxNS5leHRlcm5hbC5vb28u Oct 11 04:02:50 localhost certmonger[40265]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Oct 11 04:02:50 localhost certmonger[40265]: oSgwJhsESFRUUBsebnAwMDA1NDgxMDE1LmV4dGVybmFsLm9vby50ZXN0MB0GA1Ud Oct 11 04:02:50 localhost certmonger[40265]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Oct 11 04:02:50 localhost certmonger[40265]: BBQ0iD2GeEZeFEbcWaVO0ZS9lUXvTjANBgkqhkiG9w0BAQsFAAOCAQEAu6fXI5DW Oct 11 04:02:50 localhost certmonger[40265]: MmmfTYGfPQbZD45S8lRQQm26F4nvLyMk2M247xIVeP4rpy6IhXZtc7vzTTcDW4pk Oct 11 04:02:50 localhost certmonger[40265]: P0v5MoZ5lGOqIrlgwAi/29Vvho8VFxTKvNmvMoesKaj4SnM8EFd9ZpQCdNx9geIj Oct 11 04:02:50 localhost certmonger[40265]: B334V2dcnrsgG4qnHIeJpPEz1X9lEBOqdqLXrtpYzOoWiXOSJnUIoEUKEjK5ePzz Oct 11 04:02:50 localhost certmonger[40265]: TOu7kolY6ZdSsfVyd8tbm9z2RrlG7/n11zZWCjtCmXEzVrEi1gPxfEDFPIvOmZEN Oct 11 04:02:50 localhost certmonger[40265]: Y0t5Fwb9AGiFmCJs/20KwN4RlYDqVTPkExvhZC/0lUaHw44bHH8UXZA69I3GqsfQ Oct 11 04:02:50 localhost certmonger[40265]: YukUUGNvdghyBQ== Oct 11 04:02:50 localhost certmonger[40265]: -----END CERTIFICATE REQUEST----- Oct 11 04:02:50 localhost certmonger[40265]: " for child. Oct 11 04:02:50 localhost certmonger[40265]: 2025-10-11 08:02:50 [40265] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 04:02:50 localhost certmonger[40265]: 2025-10-11 08:02:50 [40265] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvnfe0UA//i6I9QNu8cz1EwNCt2rw9xA1t8Bmjf7uH5A5v2VuPF3whSeIU1SVI69sqE3BtlD3gOk+AjuFQOw2Er3WPRijB7c1miunaNPLJvTQVQES/SDzdCHPAOCrkeSAADN1ZiAiWV3DPQaTk8P6NzUOkntM6r8uCgoUplgEHKU0erghDLfa/+yOkm6ujdBcfhs20imShrwL45a3fLof9cSLXHFg9flS+gekBewSmQbBm1/M5jKHzSc2F9T6Ftb8x4ofeCamlhB7gp6IZX06T2kOMVr7m7zftJZ1RHQ1bs470org6r8tfeSgOPT/QxMH7HX8as/YTZ8XdFDLu/RC/wIDAQAB" for child. Oct 11 04:02:50 localhost certmonger[40265]: 2025-10-11 08:02:50 [40265] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 04:02:50 localhost certmonger[40265]: 2025-10-11 08:02:50 [40265] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 04:02:50 localhost certmonger[40265]: 2025-10-11 08:02:50 [40265] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 04:02:50 localhost certmonger[40265]: 2025-10-11 08:02:50 [40265] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:50 localhost certmonger[40265]: 2025-10-11 08:02:50 [40265] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost certmonger[40265]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0d564689-d78d-4dea-91b1-68fd00f0f5cf Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l af7aaa4e-aa7a-4455-8d42-c64622f668f6 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 649baa33-b994-46d1-a4dd-483e65048def Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 64de9e3c-b8aa-4925-a0ce-2c326b4ff445 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 64de9e3c-b8aa-4925-a0ce-2c326b4ff445 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:50 localhost sedispatch[727]: AVC Message regarding setroubleshoot, ignoring message Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost certmonger[40265]: Certificate: "MIIFSTCCA7GgAwIBAgIBGzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4MDI1MFoXDTI3MTAxMjA4MDI1MFowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTQ4MTAxNS5leHRlcm5hbC5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL533tFAP/4uiPUDbvHM9RMDQrdq8PcQNbfAZo3+7h+QOb9lbjxd8IUniFNUlSOvbKhNwbZQ94DpPgI7hUDsNhK91j0Yowe3NZorp2jTyyb00FUBEv0g83QhzwDgq5HkgAAzdWYgIlldwz0Gk5PD+jc1DpJ7TOq/LgoKFKZYBBylNHq4IQy32v/sjpJuro3QXH4bNtIpkoa8C+OWt3y6H/XEi1xxYPX5UvoHpAXsEpkGwZtfzOYyh80nNhfU+hbW/MeKH3gmppYQe4KeiGV9Ok9pDjFa+5u837SWdUR0NW7OO9KK4Oq/LX3koDj0/0MTB+x1/GrP2E2fF3RQy7v0Qv8CAwEAAaOCAd0wggHZMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFI52/8wu+TfF88bMPEiRT1YclNgYMIG2BgNVHREEga4wgauCHm5wMDAwNTQ4MTAxNS5leHRlcm5hbC5vb28udGVzdKA8BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NDgxMDE1LmV4dGVybmFsLm9vby50ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGhKDAmGwRIVFRQGx5ucDAwMDU0ODEwMTUuZXh0ZXJuYWwub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBABU/HrMBpp7pAW7hHCKDutwqweWkqGaPv4PdclFToDh7qdZcOO7FMIp82ikUIck0T6mnf/y/HMvBDnPp/r0MP4nIfDtJTBNw6BS+9kIUVf7smubNoDrU1FlAVgPLU5xw67n4qRxnSm3Vx8z9mPddFmxoHKbZAfpqwvGvBkR4jB+VXhJrqYqxaybfkANfA2/ddVGnTAhG+wLVPb9pUYnRvfHflBveghQDAXfpJV+oSlB065zhhIJ5OMsvfgdHBqg4nevvEJru1diZ4r+4APbRrqU7Z3i7uBYGRVvsX3FNSseQHPjWBiRl6Pgnir2EfWEiaX3LxuBsKt26VcqndXeHoKnH526+OXY2lxdSEAxpz44z7kAH7q2HKrcZftY6Swis6GKV+1IQE/qutv1WCTGGuH6n6YYF3aA6MZJSalfGK/FyQ9CZ30flgt9kdGDpFEZC5kE9wo88fZtcCjYLot21ZO1EpznaNJPolVH+BbF2iGj19ae9dLFQa/iTol/MQRqzUw==" Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Certificate submission still ongoing. Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Certificate submission attempt complete. Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Child status = 0. Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Child output: Oct 11 04:02:50 localhost certmonger[39512]: "-----BEGIN CERTIFICATE----- Oct 11 04:02:50 localhost certmonger[39512]: MIIFSTCCA7GgAwIBAgIBGzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:50 localhost certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:50 localhost certmonger[39512]: MDI1MFoXDTI3MTAxMjA4MDI1MFowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Oct 11 04:02:50 localhost certmonger[39512]: BAMMHm5wMDAwNTQ4MTAxNS5leHRlcm5hbC5vb28udGVzdDCCASIwDQYJKoZIhvcN Oct 11 04:02:50 localhost certmonger[39512]: AQEBBQADggEPADCCAQoCggEBAL533tFAP/4uiPUDbvHM9RMDQrdq8PcQNbfAZo3+ Oct 11 04:02:50 localhost certmonger[39512]: 7h+QOb9lbjxd8IUniFNUlSOvbKhNwbZQ94DpPgI7hUDsNhK91j0Yowe3NZorp2jT Oct 11 04:02:50 localhost certmonger[39512]: yyb00FUBEv0g83QhzwDgq5HkgAAzdWYgIlldwz0Gk5PD+jc1DpJ7TOq/LgoKFKZY Oct 11 04:02:50 localhost certmonger[39512]: BBylNHq4IQy32v/sjpJuro3QXH4bNtIpkoa8C+OWt3y6H/XEi1xxYPX5UvoHpAXs Oct 11 04:02:50 localhost certmonger[39512]: EpkGwZtfzOYyh80nNhfU+hbW/MeKH3gmppYQe4KeiGV9Ok9pDjFa+5u837SWdUR0 Oct 11 04:02:50 localhost certmonger[39512]: NW7OO9KK4Oq/LX3koDj0/0MTB+x1/GrP2E2fF3RQy7v0Qv8CAwEAAaOCAd0wggHZ Oct 11 04:02:50 localhost certmonger[39512]: MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4w Oct 11 04:02:50 localhost certmonger[39512]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Oct 11 04:02:50 localhost certmonger[39512]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Oct 11 04:02:50 localhost certmonger[39512]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Oct 11 04:02:50 localhost certmonger[39512]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Oct 11 04:02:50 localhost certmonger[39512]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFI52/8wu+TfF88bMPEiRT1YclNgY Oct 11 04:02:50 localhost certmonger[39512]: MIG2BgNVHREEga4wgauCHm5wMDAwNTQ4MTAxNS5leHRlcm5hbC5vb28udGVzdKA8 Oct 11 04:02:50 localhost certmonger[39512]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NDgxMDE1LmV4dGVybmFsLm9vby50 Oct 11 04:02:50 localhost certmonger[39512]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Oct 11 04:02:50 localhost certmonger[39512]: KDAmGwRIVFRQGx5ucDAwMDU0ODEwMTUuZXh0ZXJuYWwub29vLnRlc3QwDQYJKoZI Oct 11 04:02:50 localhost certmonger[39512]: hvcNAQELBQADggGBABU/HrMBpp7pAW7hHCKDutwqweWkqGaPv4PdclFToDh7qdZc Oct 11 04:02:50 localhost certmonger[39512]: OO7FMIp82ikUIck0T6mnf/y/HMvBDnPp/r0MP4nIfDtJTBNw6BS+9kIUVf7smubN Oct 11 04:02:50 localhost certmonger[39512]: oDrU1FlAVgPLU5xw67n4qRxnSm3Vx8z9mPddFmxoHKbZAfpqwvGvBkR4jB+VXhJr Oct 11 04:02:50 localhost certmonger[39512]: qYqxaybfkANfA2/ddVGnTAhG+wLVPb9pUYnRvfHflBveghQDAXfpJV+oSlB065zh Oct 11 04:02:50 localhost certmonger[39512]: hIJ5OMsvfgdHBqg4nevvEJru1diZ4r+4APbRrqU7Z3i7uBYGRVvsX3FNSseQHPjW Oct 11 04:02:50 localhost certmonger[39512]: BiRl6Pgnir2EfWEiaX3LxuBsKt26VcqndXeHoKnH526+OXY2lxdSEAxpz44z7kAH Oct 11 04:02:50 localhost certmonger[39512]: 7q2HKrcZftY6Swis6GKV+1IQE/qutv1WCTGGuH6n6YYF3aA6MZJSalfGK/FyQ9CZ Oct 11 04:02:50 localhost certmonger[39512]: 30flgt9kdGDpFEZC5kE9wo88fZtcCjYLot21ZO1EpznaNJPolVH+BbF2iGj19ae9 Oct 11 04:02:50 localhost certmonger[39512]: dLFQa/iTol/MQRqzUw== Oct 11 04:02:50 localhost certmonger[39512]: -----END CERTIFICATE----- Oct 11 04:02:50 localhost certmonger[39512]: " Oct 11 04:02:50 localhost certmonger[40267]: 2025-10-11 08:02:50 [40267] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 04:02:50 localhost certmonger[40267]: MIIFSTCCA7GgAwIBAgIBGzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:50 localhost certmonger[40267]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:50 localhost certmonger[40267]: MDI1MFoXDTI3MTAxMjA4MDI1MFowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Oct 11 04:02:50 localhost certmonger[40267]: BAMMHm5wMDAwNTQ4MTAxNS5leHRlcm5hbC5vb28udGVzdDCCASIwDQYJKoZIhvcN Oct 11 04:02:50 localhost certmonger[40267]: AQEBBQADggEPADCCAQoCggEBAL533tFAP/4uiPUDbvHM9RMDQrdq8PcQNbfAZo3+ Oct 11 04:02:50 localhost certmonger[40267]: 7h+QOb9lbjxd8IUniFNUlSOvbKhNwbZQ94DpPgI7hUDsNhK91j0Yowe3NZorp2jT Oct 11 04:02:50 localhost certmonger[40267]: yyb00FUBEv0g83QhzwDgq5HkgAAzdWYgIlldwz0Gk5PD+jc1DpJ7TOq/LgoKFKZY Oct 11 04:02:50 localhost certmonger[40267]: BBylNHq4IQy32v/sjpJuro3QXH4bNtIpkoa8C+OWt3y6H/XEi1xxYPX5UvoHpAXs Oct 11 04:02:50 localhost certmonger[40267]: EpkGwZtfzOYyh80nNhfU+hbW/MeKH3gmppYQe4KeiGV9Ok9pDjFa+5u837SWdUR0 Oct 11 04:02:50 localhost certmonger[40267]: NW7OO9KK4Oq/LX3koDj0/0MTB+x1/GrP2E2fF3RQy7v0Qv8CAwEAAaOCAd0wggHZ Oct 11 04:02:50 localhost certmonger[40267]: MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4w Oct 11 04:02:50 localhost certmonger[40267]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Oct 11 04:02:50 localhost certmonger[40267]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Oct 11 04:02:50 localhost certmonger[40267]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Oct 11 04:02:50 localhost certmonger[40267]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Oct 11 04:02:50 localhost certmonger[40267]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFI52/8wu+TfF88bMPEiRT1YclNgY Oct 11 04:02:50 localhost certmonger[40267]: MIG2BgNVHREEga4wgauCHm5wMDAwNTQ4MTAxNS5leHRlcm5hbC5vb28udGVzdKA8 Oct 11 04:02:50 localhost certmonger[40267]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NDgxMDE1LmV4dGVybmFsLm9vby50 Oct 11 04:02:50 localhost certmonger[40267]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Oct 11 04:02:50 localhost certmonger[40267]: KDAmGwRIVFRQGx5ucDAwMDU0ODEwMTUuZXh0ZXJuYWwub29vLnRlc3QwDQYJKoZI Oct 11 04:02:50 localhost certmonger[40267]: hvcNAQELBQADggGBABU/HrMBpp7pAW7hHCKDutwqweWkqGaPv4PdclFToDh7qdZc Oct 11 04:02:50 localhost certmonger[40267]: OO7FMIp82ikUIck0T6mnf/y/HMvBDnPp/r0MP4nIfDtJTBNw6BS+9kIUVf7smubN Oct 11 04:02:50 localhost certmonger[40267]: oDrU1FlAVgPLU5xw67n4qRxnSm3Vx8z9mPddFmxoHKbZAfpqwvGvBkR4jB+VXhJr Oct 11 04:02:50 localhost certmonger[40267]: qYqxaybfkANfA2/ddVGnTAhG+wLVPb9pUYnRvfHflBveghQDAXfpJV+oSlB065zh Oct 11 04:02:50 localhost certmonger[40267]: hIJ5OMsvfgdHBqg4nevvEJru1diZ4r+4APbRrqU7Z3i7uBYGRVvsX3FNSseQHPjW Oct 11 04:02:50 localhost certmonger[40267]: BiRl6Pgnir2EfWEiaX3LxuBsKt26VcqndXeHoKnH526+OXY2lxdSEAxpz44z7kAH Oct 11 04:02:50 localhost certmonger[40267]: 7q2HKrcZftY6Swis6GKV+1IQE/qutv1WCTGGuH6n6YYF3aA6MZJSalfGK/FyQ9CZ Oct 11 04:02:50 localhost certmonger[40267]: 30flgt9kdGDpFEZC5kE9wo88fZtcCjYLot21ZO1EpznaNJPolVH+BbF2iGj19ae9 Oct 11 04:02:50 localhost certmonger[40267]: dLFQa/iTol/MQRqzUw== Oct 11 04:02:50 localhost certmonger[40267]: -----END CERTIFICATE----- Oct 11 04:02:50 localhost certmonger[40267]: ". Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Certificate submission still ongoing. Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Certificate submission postprocessing complete. Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Child status = 0. Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Child output: Oct 11 04:02:50 localhost certmonger[39512]: "{"certificate":"-----BEGIN CERTIFICATE-----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\ndLFQa/iTol/MQRqzUw==\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 04:02:50 localhost certmonger[39512]: " Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 04:02:50 localhost certmonger[39512]: MIIFSTCCA7GgAwIBAgIBGzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 04:02:50 localhost certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 04:02:50 localhost certmonger[39512]: MDI1MFoXDTI3MTAxMjA4MDI1MFowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Oct 11 04:02:50 localhost certmonger[39512]: BAMMHm5wMDAwNTQ4MTAxNS5leHRlcm5hbC5vb28udGVzdDCCASIwDQYJKoZIhvcN Oct 11 04:02:50 localhost certmonger[39512]: AQEBBQADggEPADCCAQoCggEBAL533tFAP/4uiPUDbvHM9RMDQrdq8PcQNbfAZo3+ Oct 11 04:02:50 localhost certmonger[39512]: 7h+QOb9lbjxd8IUniFNUlSOvbKhNwbZQ94DpPgI7hUDsNhK91j0Yowe3NZorp2jT Oct 11 04:02:50 localhost certmonger[39512]: yyb00FUBEv0g83QhzwDgq5HkgAAzdWYgIlldwz0Gk5PD+jc1DpJ7TOq/LgoKFKZY Oct 11 04:02:50 localhost certmonger[39512]: BBylNHq4IQy32v/sjpJuro3QXH4bNtIpkoa8C+OWt3y6H/XEi1xxYPX5UvoHpAXs Oct 11 04:02:50 localhost certmonger[39512]: EpkGwZtfzOYyh80nNhfU+hbW/MeKH3gmppYQe4KeiGV9Ok9pDjFa+5u837SWdUR0 Oct 11 04:02:50 localhost certmonger[39512]: NW7OO9KK4Oq/LX3koDj0/0MTB+x1/GrP2E2fF3RQy7v0Qv8CAwEAAaOCAd0wggHZ Oct 11 04:02:50 localhost certmonger[39512]: MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4w Oct 11 04:02:50 localhost certmonger[39512]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Oct 11 04:02:50 localhost certmonger[39512]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Oct 11 04:02:50 localhost certmonger[39512]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Oct 11 04:02:50 localhost certmonger[39512]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Oct 11 04:02:50 localhost certmonger[39512]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFI52/8wu+TfF88bMPEiRT1YclNgY Oct 11 04:02:50 localhost certmonger[39512]: MIG2BgNVHREEga4wgauCHm5wMDAwNTQ4MTAxNS5leHRlcm5hbC5vb28udGVzdKA8 Oct 11 04:02:50 localhost certmonger[39512]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NDgxMDE1LmV4dGVybmFsLm9vby50 Oct 11 04:02:50 localhost certmonger[39512]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Oct 11 04:02:50 localhost certmonger[39512]: KDAmGwRIVFRQGx5ucDAwMDU0ODEwMTUuZXh0ZXJuYWwub29vLnRlc3QwDQYJKoZI Oct 11 04:02:50 localhost certmonger[39512]: hvcNAQELBQADggGBABU/HrMBpp7pAW7hHCKDutwqweWkqGaPv4PdclFToDh7qdZc Oct 11 04:02:50 localhost certmonger[39512]: OO7FMIp82ikUIck0T6mnf/y/HMvBDnPp/r0MP4nIfDtJTBNw6BS+9kIUVf7smubN Oct 11 04:02:50 localhost certmonger[39512]: oDrU1FlAVgPLU5xw67n4qRxnSm3Vx8z9mPddFmxoHKbZAfpqwvGvBkR4jB+VXhJr Oct 11 04:02:50 localhost certmonger[39512]: qYqxaybfkANfA2/ddVGnTAhG+wLVPb9pUYnRvfHflBveghQDAXfpJV+oSlB065zh Oct 11 04:02:50 localhost certmonger[39512]: hIJ5OMsvfgdHBqg4nevvEJru1diZ4r+4APbRrqU7Z3i7uBYGRVvsX3FNSseQHPjW Oct 11 04:02:50 localhost certmonger[39512]: BiRl6Pgnir2EfWEiaX3LxuBsKt26VcqndXeHoKnH526+OXY2lxdSEAxpz44z7kAH Oct 11 04:02:50 localhost certmonger[39512]: 7q2HKrcZftY6Swis6GKV+1IQE/qutv1WCTGGuH6n6YYF3aA6MZJSalfGK/FyQ9CZ Oct 11 04:02:50 localhost certmonger[39512]: 30flgt9kdGDpFEZC5kE9wo88fZtcCjYLot21ZO1EpznaNJPolVH+BbF2iGj19ae9 Oct 11 04:02:50 localhost certmonger[39512]: dLFQa/iTol/MQRqzUw== Oct 11 04:02:50 localhost certmonger[39512]: -----END CERTIFICATE----- Oct 11 04:02:50 localhost certmonger[39512]: ". Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Certificate issued (0 chain certificates, 0 roots). Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] No hooks set for pre-save command. Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 08e634ed-c2f3-4cc7-8d9d-1025a700c2c6 Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost certmonger[40275]: Certificate in file "/etc/pki/tls/certs/httpd-external.crt" issued by CA and saved. Oct 11 04:02:50 localhost certmonger[39512]: 2025-10-11 08:02:50 [39512] Wrote to /var/lib/certmonger/requests/20251011080249 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0d564689-d78d-4dea-91b1-68fd00f0f5cf Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 55206312-e631-4f7a-9cbb-94ad6bbd2459 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 153335ef-6e01-4bb1-a5ae-8cce777766c4 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 153335ef-6e01-4bb1-a5ae-8cce777766c4 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:50 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26f96730-e7c3-484f-b573-075138e72f7c Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26f96730-e7c3-484f-b573-075138e72f7c Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost python3[40291]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4dab74ae-7478-4aec-95d8-999ee0ccfa50 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4dab74ae-7478-4aec-95d8-999ee0ccfa50 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:51 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost sedispatch[727]: AVC Message regarding setroubleshoot, ignoring message Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:52 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 687f15af-9f80-4cc7-887d-466c0bf4461b Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:53 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9396745f-b003-47b2-b060-fb2173788c70 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 19111fa6-1762-4cb6-a987-4263c5f49e68 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4dab74ae-7478-4aec-95d8-999ee0ccfa50 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6692a83b-bb94-4845-879a-29ed9872facf Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7b450de5-8eab-4f5e-b369-1dfde0ada79d Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ecec4f6f-8b83-4d58-827b-e2544272d219 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 407aa926-ebe9-4a0b-ac32-9f52f4aed920 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 407aa926-ebe9-4a0b-ac32-9f52f4aed920 Oct 11 04:02:54 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 67e6be48-70aa-43c2-8e2b-0616a054f552 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 67e6be48-70aa-43c2-8e2b-0616a054f552 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 55857ced-23f7-4df3-9c21-8a7985e5ba1d Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6692a83b-bb94-4845-879a-29ed9872facf Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a1aaca04-87f0-4969-89bf-da708db6005a Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0d564689-d78d-4dea-91b1-68fd00f0f5cf Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l af7aaa4e-aa7a-4455-8d42-c64622f668f6 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 649baa33-b994-46d1-a4dd-483e65048def Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 64de9e3c-b8aa-4925-a0ce-2c326b4ff445 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 64de9e3c-b8aa-4925-a0ce-2c326b4ff445 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 08e634ed-c2f3-4cc7-8d9d-1025a700c2c6 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0d564689-d78d-4dea-91b1-68fd00f0f5cf Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 55206312-e631-4f7a-9cbb-94ad6bbd2459 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 153335ef-6e01-4bb1-a5ae-8cce777766c4 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 153335ef-6e01-4bb1-a5ae-8cce777766c4 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26f96730-e7c3-484f-b573-075138e72f7c Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26f96730-e7c3-484f-b573-075138e72f7c Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4dab74ae-7478-4aec-95d8-999ee0ccfa50 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4dab74ae-7478-4aec-95d8-999ee0ccfa50 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 687f15af-9f80-4cc7-887d-466c0bf4461b Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost kernel: VFS: idmapped mount is not enabled. Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost sedispatch[727]: AVC Message regarding setroubleshoot, ignoring message Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4dab74ae-7478-4aec-95d8-999ee0ccfa50 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ef8ea8fa-4073-430c-b275-6cc07b826d24 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:55 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6692a83b-bb94-4845-879a-29ed9872facf Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7b450de5-8eab-4f5e-b369-1dfde0ada79d Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ecec4f6f-8b83-4d58-827b-e2544272d219 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 407aa926-ebe9-4a0b-ac32-9f52f4aed920 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 407aa926-ebe9-4a0b-ac32-9f52f4aed920 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 67e6be48-70aa-43c2-8e2b-0616a054f552 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 67e6be48-70aa-43c2-8e2b-0616a054f552 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 55857ced-23f7-4df3-9c21-8a7985e5ba1d Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6692a83b-bb94-4845-879a-29ed9872facf Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a1aaca04-87f0-4969-89bf-da708db6005a Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0d564689-d78d-4dea-91b1-68fd00f0f5cf Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l af7aaa4e-aa7a-4455-8d42-c64622f668f6 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 649baa33-b994-46d1-a4dd-483e65048def Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 64de9e3c-b8aa-4925-a0ce-2c326b4ff445 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 64de9e3c-b8aa-4925-a0ce-2c326b4ff445 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 08e634ed-c2f3-4cc7-8d9d-1025a700c2c6 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0d564689-d78d-4dea-91b1-68fd00f0f5cf Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 55206312-e631-4f7a-9cbb-94ad6bbd2459 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 153335ef-6e01-4bb1-a5ae-8cce777766c4 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 153335ef-6e01-4bb1-a5ae-8cce777766c4 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26f96730-e7c3-484f-b573-075138e72f7c Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26f96730-e7c3-484f-b573-075138e72f7c Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4dab74ae-7478-4aec-95d8-999ee0ccfa50 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4dab74ae-7478-4aec-95d8-999ee0ccfa50 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 687f15af-9f80-4cc7-887d-466c0bf4461b Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4dab74ae-7478-4aec-95d8-999ee0ccfa50 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ef8ea8fa-4073-430c-b275-6cc07b826d24 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:56 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6692a83b-bb94-4845-879a-29ed9872facf Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7b450de5-8eab-4f5e-b369-1dfde0ada79d Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ecec4f6f-8b83-4d58-827b-e2544272d219 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 407aa926-ebe9-4a0b-ac32-9f52f4aed920 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 407aa926-ebe9-4a0b-ac32-9f52f4aed920 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 67e6be48-70aa-43c2-8e2b-0616a054f552 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 67e6be48-70aa-43c2-8e2b-0616a054f552 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 55857ced-23f7-4df3-9c21-8a7985e5ba1d Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6692a83b-bb94-4845-879a-29ed9872facf Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a1aaca04-87f0-4969-89bf-da708db6005a Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0d564689-d78d-4dea-91b1-68fd00f0f5cf Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l af7aaa4e-aa7a-4455-8d42-c64622f668f6 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 649baa33-b994-46d1-a4dd-483e65048def Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 64de9e3c-b8aa-4925-a0ce-2c326b4ff445 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 64de9e3c-b8aa-4925-a0ce-2c326b4ff445 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 08e634ed-c2f3-4cc7-8d9d-1025a700c2c6 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0d564689-d78d-4dea-91b1-68fd00f0f5cf Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 55206312-e631-4f7a-9cbb-94ad6bbd2459 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 153335ef-6e01-4bb1-a5ae-8cce777766c4 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 153335ef-6e01-4bb1-a5ae-8cce777766c4 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26f96730-e7c3-484f-b573-075138e72f7c Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26f96730-e7c3-484f-b573-075138e72f7c Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4dab74ae-7478-4aec-95d8-999ee0ccfa50 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4dab74ae-7478-4aec-95d8-999ee0ccfa50 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 687f15af-9f80-4cc7-887d-466c0bf4461b Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 19111fa6-1762-4cb6-a987-4263c5f49e68 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f1101dda-2a58-40ad-85ec-b80837e132fd Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4dab74ae-7478-4aec-95d8-999ee0ccfa50 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ef8ea8fa-4073-430c-b275-6cc07b826d24 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6692a83b-bb94-4845-879a-29ed9872facf Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7b450de5-8eab-4f5e-b369-1dfde0ada79d Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 67e6be48-70aa-43c2-8e2b-0616a054f552 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 55857ced-23f7-4df3-9c21-8a7985e5ba1d Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6692a83b-bb94-4845-879a-29ed9872facf Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a1aaca04-87f0-4969-89bf-da708db6005a Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0d564689-d78d-4dea-91b1-68fd00f0f5cf Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l af7aaa4e-aa7a-4455-8d42-c64622f668f6 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 649baa33-b994-46d1-a4dd-483e65048def Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 64de9e3c-b8aa-4925-a0ce-2c326b4ff445 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 64de9e3c-b8aa-4925-a0ce-2c326b4ff445 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 08e634ed-c2f3-4cc7-8d9d-1025a700c2c6 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0d564689-d78d-4dea-91b1-68fd00f0f5cf Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 55206312-e631-4f7a-9cbb-94ad6bbd2459 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 153335ef-6e01-4bb1-a5ae-8cce777766c4 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 153335ef-6e01-4bb1-a5ae-8cce777766c4 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26f96730-e7c3-484f-b573-075138e72f7c Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:57 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26f96730-e7c3-484f-b573-075138e72f7c Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4dab74ae-7478-4aec-95d8-999ee0ccfa50 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4dab74ae-7478-4aec-95d8-999ee0ccfa50 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 687f15af-9f80-4cc7-887d-466c0bf4461b Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9396745f-b003-47b2-b060-fb2173788c70 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68f87ad5-719b-433d-92c7-9ce28a41f653 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ef8ea8fa-4073-430c-b275-6cc07b826d24 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5e5d092-e379-4358-8985-cfece7ed9284 Oct 11 04:02:58 localhost setroubleshoot[40120]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Oct 11 04:03:05 localhost podman[40292]: 2025-10-11 08:02:51.398929274 +0000 UTC m=+0.050742315 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 Oct 11 04:03:05 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 04:03:06 localhost python3[40471]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 cluster.common.tag/cinder-backup:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:03:06 localhost podman[40472]: 2025-10-11 08:03:06.196499048 +0000 UTC m=+0.045639695 image tag a494a4709399d3b48f7a72d9a7ba248a8aef77a31bc332f2b941ea1a9802eb23 cluster.common.tag/cinder-backup:pcmklatest Oct 11 04:03:06 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 04:03:06 localhost python3[40500]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:03:08 localhost systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Oct 11 04:03:08 localhost systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.545s CPU time. Oct 11 04:03:08 localhost systemd[1]: setroubleshootd.service: Deactivated successfully. Oct 11 04:03:08 localhost systemd[1]: setroubleshootd.service: Consumed 14.451s CPU time. Oct 11 04:03:14 localhost podman[40501]: 2025-10-11 08:03:06.808669682 +0000 UTC m=+0.030011687 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 Oct 11 04:03:14 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 04:03:14 localhost python3[40872]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 cluster.common.tag/cinder-volume:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:03:14 localhost podman[40873]: 2025-10-11 08:03:14.878431224 +0000 UTC m=+0.047000841 image tag 6478a0150ae96c1577ab98090485db34bd923bea7fbd99b449759855054ad48a cluster.common.tag/cinder-volume:pcmklatest Oct 11 04:03:14 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 04:03:15 localhost python3[40900]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active rsyslog _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 04:03:16 localhost python3[40917]: ansible-blockinfile Invoked with content=if $syslogfacility-text == 'local0' and $programname == 'haproxy' then -/var/log/containers/haproxy/haproxy.log#012& stop#012 create=True path=/etc/rsyslog.d/openstack-haproxy.conf block=if $syslogfacility-text == 'local0' and $programname == 'haproxy' then -/var/log/containers/haproxy/haproxy.log#012& stop#012 state=present marker=# {mark} ANSIBLE MANAGED BLOCK backup=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 04:03:16 localhost python3[40933]: ansible-ansible.legacy.systemd Invoked with name=rsyslog state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Oct 11 08:03:16 np0005481015 systemd[1]: Stopping System Logging Service... Oct 11 08:03:17 np0005481015 rsyslogd[758]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="758" x-info="https://www.rsyslog.com"] exiting on signal 15. Oct 11 08:03:17 np0005481015 systemd[1]: rsyslog.service: Deactivated successfully. Oct 11 08:03:17 np0005481015 systemd[1]: Stopped System Logging Service. Oct 11 08:03:17 np0005481015 systemd[1]: rsyslog.service: Consumed 1.259s CPU time, read 920.0K from disk, written 3.3M to disk. Oct 11 08:03:17 np0005481015 systemd[1]: Starting System Logging Service... Oct 11 08:03:17 np0005481015 rsyslogd[40936]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="40936" x-info="https://www.rsyslog.com"] start Oct 11 08:03:17 np0005481015 systemd[1]: Started System Logging Service. Oct 11 08:03:17 np0005481015 rsyslogd[40936]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Oct 11 08:03:17 np0005481015 python3[40955]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:03:23 np0005481015 podman[40956]: 2025-10-11 08:03:17.84603506 +0000 UTC m=+0.044817444 image pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Oct 11 08:03:23 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:24 np0005481015 python3[41067]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 cluster.common.tag/haproxy:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:03:24 np0005481015 podman[41068]: 2025-10-11 08:03:24.167331236 +0000 UTC m=+0.046057676 image tag ca7d8eb100efddb0a29cba30061b2c9178f350b380fee5b69208dfdf229628f7 cluster.common.tag/haproxy:pcmklatest Oct 11 08:03:24 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:24 np0005481015 python3[41094]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:03:27 np0005481015 python3[41111]: ansible-systemd Invoked with enabled=True masked=False name=certmonger.service state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None Oct 11 08:03:29 np0005481015 python3[41130]: ansible-file Invoked with path=/etc/pki/tls/certs/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Oct 11 08:03:29 np0005481015 python3[41146]: ansible-file Invoked with path=/etc/pki/tls/private/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Oct 11 08:03:29 np0005481015 python3[41162]: ansible-ansible.legacy.command Invoked with _raw_params=set -e#012ca_pem='/etc/pki/ca-trust/source/anchors/cm-local-ca.pem'#012openssl pkcs12 -in /var/lib/certmonger/local/creds -out ${ca_pem} -nokeys -nodes -passin pass:''#012chmod 0644 ${ca_pem}#012update-ca-trust extract#012test -e ${ca_pem} && openssl x509 -checkend 0 -noout -in ${ca_pem}#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:03:31 np0005481015 python3[41188]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:03:32 np0005481015 python3[41208]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:03:35 np0005481015 python3[41225]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:03:38 np0005481015 python3[41242]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:03:39 np0005481015 python3[41258]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:03:39 np0005481015 python3[41274]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:03:40 np0005481015 python3[41292]: ansible-certificate_request Invoked with name=haproxy-external-cert dns=['overcloud.ooo.test'] ip=[] principal=['haproxy/overcloud.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-external-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-external.crt"#012cp "/etc/pki/tls/private/haproxy-external-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-external.key"#012#012ca_type=ipa#012if [ "$ca_type" = "self-sign" ]; then#012 # refresh the ca cert just in case the ca cert has been renewed#012 ca_pem='/etc/pki/ca-trust/source/anchors/cm-local-ca.pem'#012 openssl pkcs12 -in /var/lib/certmonger/local/creds -out ${ca_pem} -nokeys -nodes -passin pass:''#012 chmod 0644 ${ca_pem}#012 update-ca-trust extract#012 test -e ${ca_pem} && openssl x509 -checkend 0 -noout -in ${ca_pem}#012 openssl x509 -in ${ca_pem} -out /tmp/cm-local-ca.pem#012 ca_path="/tmp/cm-local-ca.pem"#012else#012 ca_path="/etc/ipa/ca.crt"#012fi#012#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-external.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-external.key"#012service_pem="/etc/pki/tls/private/overcloud_endpoint.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:03:40 np0005481015 certmonger[39512]: 2025-10-11 08:03:40 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481015 certmonger[39512]: 2025-10-11 08:03:40 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481015 certmonger[39512]: 2025-10-11 08:03:40 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481015 certmonger[39512]: 2025-10-11 08:03:40 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481015 certmonger[39512]: 2025-10-11 08:03:40 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481015 certmonger[39512]: 2025-10-11 08:03:40 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481015 certmonger[39512]: 2025-10-11 08:03:40 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481015 certmonger[39512]: 2025-10-11 08:03:40 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481015 certmonger[39512]: 2025-10-11 08:03:40 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481015 certmonger[39512]: 2025-10-11 08:03:40 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481015 certmonger[39512]: 2025-10-11 08:03:40 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481015 certmonger[39512]: 2025-10-11 08:03:40 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481015 certmonger[39512]: 2025-10-11 08:03:40 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481015 certmonger[39512]: 2025-10-11 08:03:40 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:40 np0005481015 certmonger[39512]: 2025-10-11 08:03:40 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481015 certmonger[41302]: 2025-10-11 08:03:41 [41302] Setting "CERTMONGER_REQ_SUBJECT" to "CN=overcloud.ooo.test" for child. Oct 11 08:03:41 np0005481015 certmonger[41302]: 2025-10-11 08:03:41 [41302] Setting "CERTMONGER_REQ_HOSTNAME" to "overcloud.ooo.test Oct 11 08:03:41 np0005481015 certmonger[41302]: " for child. Oct 11 08:03:41 np0005481015 certmonger[41302]: 2025-10-11 08:03:41 [41302] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/overcloud.ooo.test@OOO.TEST Oct 11 08:03:41 np0005481015 certmonger[41302]: " for child. Oct 11 08:03:41 np0005481015 certmonger[41302]: 2025-10-11 08:03:41 [41302] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:03:41 np0005481015 certmonger[41302]: 2025-10-11 08:03:41 [41302] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:03:41 np0005481015 certmonger[41302]: MIIDmjCCAoICAQAwHTEbMBkGA1UEAxMSb3ZlcmNsb3VkLm9vby50ZXN0MIIBIjAN Oct 11 08:03:41 np0005481015 certmonger[41302]: BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArSRo7OimYevN0zve4d0gwxxbdlCo Oct 11 08:03:41 np0005481015 certmonger[41302]: dwnr5B/EBoO+xmKIc96XVoam+mVcVsz1s9cbjUjhN/OfIWQ5FPYNOmtfaBiwrUoI Oct 11 08:03:41 np0005481015 certmonger[41302]: XbLKLp9oLQSijGgwoXagHFPfH6Mn3lMk+pkO3aIlRJM2LHDYXK3Xx0OJepIcxxcX Oct 11 08:03:41 np0005481015 certmonger[41302]: fJOoehiBSh7DuvW+FNzcx5tDC9PnX9ERC6XpwKr5OtSTghFg5ZZePiEATkYQ3Zqo Oct 11 08:03:41 np0005481015 certmonger[41302]: pUBrFxbapzTmcVqD6mD73YSCiG57TJnXj16w7vm7j/+WIn/J7EYVLgosedkizM+s Oct 11 08:03:41 np0005481015 certmonger[41302]: Gx2KCclpc3uxg/5oMOGD2+b/r+w87nPCE91O+SqrABajSYfYjM8yWkLSLQIDAQAB Oct 11 08:03:41 np0005481015 certmonger[41302]: oIIBNjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAwADEAMQAwADgAMAAzADQA Oct 11 08:03:41 np0005481015 certmonger[41302]: MDCCAQUGCSqGSIb3DQEJDjGB9zCB9DALBgNVHQ8EBAMCBaAwgZgGA1UdEQSBkDCB Oct 11 08:03:41 np0005481015 certmonger[41302]: jYISb3ZlcmNsb3VkLm9vby50ZXN0oDMGCisGAQQBgjcUAgOgJQwjaGFwcm94eS9v Oct 11 08:03:41 np0005481015 certmonger[41302]: dmVyY2xvdWQub29vLnRlc3RAT09PLlRFU1SgQgYGKwYBBQICoDgwNqAKGwhPT08u Oct 11 08:03:41 np0005481015 certmonger[41302]: VEVTVKEoMCagAwIBAaEfMB0bB2hhcHJveHkbEm92ZXJjbG91ZC5vb28udGVzdDAd Oct 11 08:03:41 np0005481015 certmonger[41302]: BgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNV Oct 11 08:03:41 np0005481015 certmonger[41302]: HQ4EFgQUNIg9hnhGXhRG3FmlTtGUvZVF704wDQYJKoZIhvcNAQELBQADggEBAH+W Oct 11 08:03:41 np0005481015 certmonger[41302]: KhqOhD1VMUsMhHQ3ccMYNvywY+KRuIXTMfx1ukqkvBz0YGW5CFYOsWNRC00tXfdD Oct 11 08:03:41 np0005481015 certmonger[41302]: pIwIR5Qy0HdFzQ8HQqyFp+qhNiPS3nRQv429aMtVIXQdUuc8iVlWTZf5Go6vY3Bd Oct 11 08:03:41 np0005481015 certmonger[41302]: BGarLApNY+wgdgIfg4870HJd1NhHqkElQFax4zuX1FCidvOU2YFhtw8Fl5z+YUaC Oct 11 08:03:41 np0005481015 certmonger[41302]: 9w7LGVv0HRG6GZ5JwXNUd6CzdUqnUSbLNtJMvv+wmAFptCcwfHqu3SdbRF05TIWT Oct 11 08:03:41 np0005481015 certmonger[41302]: PSXVHu4wLgJqwZWnFDBnpMvqxyL2JTLGVCKkyISMwALjePLHJtDWZMHUdfoePizD Oct 11 08:03:41 np0005481015 certmonger[41302]: VoZjGzp1a5RLjtwAKzU= Oct 11 08:03:41 np0005481015 certmonger[41302]: -----END CERTIFICATE REQUEST----- Oct 11 08:03:41 np0005481015 certmonger[41302]: " for child. Oct 11 08:03:41 np0005481015 certmonger[41302]: 2025-10-11 08:03:41 [41302] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:03:41 np0005481015 certmonger[41302]: 2025-10-11 08:03:41 [41302] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArSRo7OimYevN0zve4d0gwxxbdlCodwnr5B/EBoO+xmKIc96XVoam+mVcVsz1s9cbjUjhN/OfIWQ5FPYNOmtfaBiwrUoIXbLKLp9oLQSijGgwoXagHFPfH6Mn3lMk+pkO3aIlRJM2LHDYXK3Xx0OJepIcxxcXfJOoehiBSh7DuvW+FNzcx5tDC9PnX9ERC6XpwKr5OtSTghFg5ZZePiEATkYQ3ZqopUBrFxbapzTmcVqD6mD73YSCiG57TJnXj16w7vm7j/+WIn/J7EYVLgosedkizM+sGx2KCclpc3uxg/5oMOGD2+b/r+w87nPCE91O+SqrABajSYfYjM8yWkLSLQIDAQAB" for child. Oct 11 08:03:41 np0005481015 certmonger[41302]: 2025-10-11 08:03:41 [41302] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:03:41 np0005481015 certmonger[41302]: 2025-10-11 08:03:41 [41302] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:03:41 np0005481015 certmonger[41302]: 2025-10-11 08:03:41 [41302] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:03:41 np0005481015 certmonger[41302]: 2025-10-11 08:03:41 [41302] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:03:41 np0005481015 certmonger[41302]: 2025-10-11 08:03:41 [41302] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481015 certmonger[41302]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:03:41 np0005481015 certmonger[41302]: Certificate: "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" Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Certificate submission still ongoing. Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Certificate submission attempt complete. Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Child status = 0. Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Child output: Oct 11 08:03:41 np0005481015 certmonger[39512]: "-----BEGIN CERTIFICATE----- Oct 11 08:03:41 np0005481015 certmonger[39512]: MIIFHzCCA4egAwIBAgIBKTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:41 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:41 np0005481015 certmonger[39512]: MDM0MVoXDTI3MTAxMjA4MDM0MVowMDERMA8GA1UECgwIT09PLlRFU1QxGzAZBgNV Oct 11 08:03:41 np0005481015 certmonger[39512]: BAMMEm92ZXJjbG91ZC5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC Oct 11 08:03:41 np0005481015 certmonger[39512]: AQoCggEBAK0kaOzopmHrzdM73uHdIMMcW3ZQqHcJ6+QfxAaDvsZiiHPel1aGpvpl Oct 11 08:03:41 np0005481015 certmonger[39512]: XFbM9bPXG41I4TfznyFkORT2DTprX2gYsK1KCF2yyi6faC0EooxoMKF2oBxT3x+j Oct 11 08:03:41 np0005481015 certmonger[39512]: J95TJPqZDt2iJUSTNixw2Fyt18dDiXqSHMcXF3yTqHoYgUoew7r1vhTc3MebQwvT Oct 11 08:03:41 np0005481015 certmonger[39512]: 51/REQul6cCq+TrUk4IRYOWWXj4hAE5GEN2aqKVAaxcW2qc05nFag+pg+92Egohu Oct 11 08:03:41 np0005481015 certmonger[39512]: e0yZ149esO75u4//liJ/yexGFS4KLHnZIszPrBsdignJaXN7sYP+aDDhg9vm/6/s Oct 11 08:03:41 np0005481015 certmonger[39512]: PO5zwhPdTvkqqwAWo0mH2IzPMlpC0i0CAwEAAaOCAb8wggG7MB8GA1UdIwQYMBaA Oct 11 08:03:41 np0005481015 certmonger[39512]: FKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcw Oct 11 08:03:41 np0005481015 certmonger[39512]: AYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE Oct 11 08:03:41 np0005481015 certmonger[39512]: 8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCg Oct 11 08:03:41 np0005481015 certmonger[39512]: LoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6i Oct 11 08:03:41 np0005481015 certmonger[39512]: NKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRo Oct 11 08:03:41 np0005481015 certmonger[39512]: b3JpdHkwHQYDVR0OBBYEFM0eUJ0yaOTG0g/wzYbCCgYsyOCnMIGYBgNVHREEgZAw Oct 11 08:03:41 np0005481015 certmonger[39512]: gY2CEm92ZXJjbG91ZC5vb28udGVzdKAzBgorBgEEAYI3FAIDoCUMI2hhcHJveHkv Oct 11 08:03:41 np0005481015 certmonger[39512]: b3ZlcmNsb3VkLm9vby50ZXN0QE9PTy5URVNUoEIGBisGAQUCAqA4MDagChsIT09P Oct 11 08:03:41 np0005481015 certmonger[39512]: LlRFU1ShKDAmoAMCAQGhHzAdGwdoYXByb3h5GxJvdmVyY2xvdWQub29vLnRlc3Qw Oct 11 08:03:41 np0005481015 certmonger[39512]: DQYJKoZIhvcNAQELBQADggGBALD/sFEUesMMfvGj7078OqpLNy0bxJ2zwpWrG/dQ Oct 11 08:03:41 np0005481015 certmonger[39512]: cx/z/UIBxNyI6wJ3u8I3jjolzKXes3rfSUjq5Gjimtl7XTFJnp2tLPI/rvcBZz0Y Oct 11 08:03:41 np0005481015 certmonger[39512]: B6y84t3g0m85qIYXSu06Bl2L+lZkUZQ5IStOr9FrPscycPkislr9dF4ifZPVjHtC Oct 11 08:03:41 np0005481015 certmonger[39512]: XSDVrOcsIUzOXISC7/Lz7x7AYNiCGDV9ijFE4dRT9iIRKfMiAQS6dqmxtnFIZHX5 Oct 11 08:03:41 np0005481015 certmonger[39512]: iJgGU40q6n0mHQ8wwd2ogWNIr/Eica+RtRvY3i//AUSl7R673Q81FYZTewJ55KFO Oct 11 08:03:41 np0005481015 certmonger[39512]: BfVk3YwClK8JIUH7UG0aESIucUlbGt538FoZjYWnFWhMbltPOc5qNRCt+bIozwpZ Oct 11 08:03:41 np0005481015 certmonger[39512]: 1/Ia3VUg7kGM+c8sj1d+lp2tjTWz5UHCAWT+gH64fuBqUfyb9qCp5iD2i2VuSy0/ Oct 11 08:03:41 np0005481015 certmonger[39512]: ScCX2ll2rZvxA+zoXQeLmytqt3OXYjmVGhENIaTuEsvnN648hY/ooyitpEthfspc Oct 11 08:03:41 np0005481015 certmonger[39512]: wz4dJP4yKXJKeDfVg3Z+MIlsJQ== Oct 11 08:03:41 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:03:41 np0005481015 certmonger[39512]: " Oct 11 08:03:41 np0005481015 certmonger[41304]: 2025-10-11 08:03:41 [41304] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:03:41 np0005481015 certmonger[41304]: MIIFHzCCA4egAwIBAgIBKTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:41 np0005481015 certmonger[41304]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:41 np0005481015 certmonger[41304]: MDM0MVoXDTI3MTAxMjA4MDM0MVowMDERMA8GA1UECgwIT09PLlRFU1QxGzAZBgNV Oct 11 08:03:41 np0005481015 certmonger[41304]: BAMMEm92ZXJjbG91ZC5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC Oct 11 08:03:41 np0005481015 certmonger[41304]: AQoCggEBAK0kaOzopmHrzdM73uHdIMMcW3ZQqHcJ6+QfxAaDvsZiiHPel1aGpvpl Oct 11 08:03:41 np0005481015 certmonger[41304]: XFbM9bPXG41I4TfznyFkORT2DTprX2gYsK1KCF2yyi6faC0EooxoMKF2oBxT3x+j Oct 11 08:03:41 np0005481015 certmonger[41304]: J95TJPqZDt2iJUSTNixw2Fyt18dDiXqSHMcXF3yTqHoYgUoew7r1vhTc3MebQwvT Oct 11 08:03:41 np0005481015 certmonger[41304]: 51/REQul6cCq+TrUk4IRYOWWXj4hAE5GEN2aqKVAaxcW2qc05nFag+pg+92Egohu Oct 11 08:03:41 np0005481015 certmonger[41304]: e0yZ149esO75u4//liJ/yexGFS4KLHnZIszPrBsdignJaXN7sYP+aDDhg9vm/6/s Oct 11 08:03:41 np0005481015 certmonger[41304]: PO5zwhPdTvkqqwAWo0mH2IzPMlpC0i0CAwEAAaOCAb8wggG7MB8GA1UdIwQYMBaA Oct 11 08:03:41 np0005481015 certmonger[41304]: FKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcw Oct 11 08:03:41 np0005481015 certmonger[41304]: AYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE Oct 11 08:03:41 np0005481015 certmonger[41304]: 8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCg Oct 11 08:03:41 np0005481015 certmonger[41304]: LoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6i Oct 11 08:03:41 np0005481015 certmonger[41304]: NKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRo Oct 11 08:03:41 np0005481015 certmonger[41304]: b3JpdHkwHQYDVR0OBBYEFM0eUJ0yaOTG0g/wzYbCCgYsyOCnMIGYBgNVHREEgZAw Oct 11 08:03:41 np0005481015 certmonger[41304]: gY2CEm92ZXJjbG91ZC5vb28udGVzdKAzBgorBgEEAYI3FAIDoCUMI2hhcHJveHkv Oct 11 08:03:41 np0005481015 certmonger[41304]: b3ZlcmNsb3VkLm9vby50ZXN0QE9PTy5URVNUoEIGBisGAQUCAqA4MDagChsIT09P Oct 11 08:03:41 np0005481015 certmonger[41304]: LlRFU1ShKDAmoAMCAQGhHzAdGwdoYXByb3h5GxJvdmVyY2xvdWQub29vLnRlc3Qw Oct 11 08:03:41 np0005481015 certmonger[41304]: DQYJKoZIhvcNAQELBQADggGBALD/sFEUesMMfvGj7078OqpLNy0bxJ2zwpWrG/dQ Oct 11 08:03:41 np0005481015 certmonger[41304]: cx/z/UIBxNyI6wJ3u8I3jjolzKXes3rfSUjq5Gjimtl7XTFJnp2tLPI/rvcBZz0Y Oct 11 08:03:41 np0005481015 certmonger[41304]: B6y84t3g0m85qIYXSu06Bl2L+lZkUZQ5IStOr9FrPscycPkislr9dF4ifZPVjHtC Oct 11 08:03:41 np0005481015 certmonger[41304]: XSDVrOcsIUzOXISC7/Lz7x7AYNiCGDV9ijFE4dRT9iIRKfMiAQS6dqmxtnFIZHX5 Oct 11 08:03:41 np0005481015 certmonger[41304]: iJgGU40q6n0mHQ8wwd2ogWNIr/Eica+RtRvY3i//AUSl7R673Q81FYZTewJ55KFO Oct 11 08:03:41 np0005481015 certmonger[41304]: BfVk3YwClK8JIUH7UG0aESIucUlbGt538FoZjYWnFWhMbltPOc5qNRCt+bIozwpZ Oct 11 08:03:41 np0005481015 certmonger[41304]: 1/Ia3VUg7kGM+c8sj1d+lp2tjTWz5UHCAWT+gH64fuBqUfyb9qCp5iD2i2VuSy0/ Oct 11 08:03:41 np0005481015 certmonger[41304]: ScCX2ll2rZvxA+zoXQeLmytqt3OXYjmVGhENIaTuEsvnN648hY/ooyitpEthfspc Oct 11 08:03:41 np0005481015 certmonger[41304]: wz4dJP4yKXJKeDfVg3Z+MIlsJQ== Oct 11 08:03:41 np0005481015 certmonger[41304]: -----END CERTIFICATE----- Oct 11 08:03:41 np0005481015 certmonger[41304]: ". Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Certificate submission still ongoing. Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Certificate submission postprocessing complete. Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Child status = 0. Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Child output: Oct 11 08:03:41 np0005481015 certmonger[39512]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nwz4dJP4yKXJKeDfVg3Z+MIlsJQ==\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:03:41 np0005481015 certmonger[39512]: " Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:03:41 np0005481015 certmonger[39512]: MIIFHzCCA4egAwIBAgIBKTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:41 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:41 np0005481015 certmonger[39512]: MDM0MVoXDTI3MTAxMjA4MDM0MVowMDERMA8GA1UECgwIT09PLlRFU1QxGzAZBgNV Oct 11 08:03:41 np0005481015 certmonger[39512]: BAMMEm92ZXJjbG91ZC5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC Oct 11 08:03:41 np0005481015 certmonger[39512]: AQoCggEBAK0kaOzopmHrzdM73uHdIMMcW3ZQqHcJ6+QfxAaDvsZiiHPel1aGpvpl Oct 11 08:03:41 np0005481015 certmonger[39512]: XFbM9bPXG41I4TfznyFkORT2DTprX2gYsK1KCF2yyi6faC0EooxoMKF2oBxT3x+j Oct 11 08:03:41 np0005481015 certmonger[39512]: J95TJPqZDt2iJUSTNixw2Fyt18dDiXqSHMcXF3yTqHoYgUoew7r1vhTc3MebQwvT Oct 11 08:03:41 np0005481015 certmonger[39512]: 51/REQul6cCq+TrUk4IRYOWWXj4hAE5GEN2aqKVAaxcW2qc05nFag+pg+92Egohu Oct 11 08:03:41 np0005481015 certmonger[39512]: e0yZ149esO75u4//liJ/yexGFS4KLHnZIszPrBsdignJaXN7sYP+aDDhg9vm/6/s Oct 11 08:03:41 np0005481015 certmonger[39512]: PO5zwhPdTvkqqwAWo0mH2IzPMlpC0i0CAwEAAaOCAb8wggG7MB8GA1UdIwQYMBaA Oct 11 08:03:41 np0005481015 certmonger[39512]: FKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcw Oct 11 08:03:41 np0005481015 certmonger[39512]: AYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE Oct 11 08:03:41 np0005481015 certmonger[39512]: 8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCg Oct 11 08:03:41 np0005481015 certmonger[39512]: LoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6i Oct 11 08:03:41 np0005481015 certmonger[39512]: NKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRo Oct 11 08:03:41 np0005481015 certmonger[39512]: b3JpdHkwHQYDVR0OBBYEFM0eUJ0yaOTG0g/wzYbCCgYsyOCnMIGYBgNVHREEgZAw Oct 11 08:03:41 np0005481015 certmonger[39512]: gY2CEm92ZXJjbG91ZC5vb28udGVzdKAzBgorBgEEAYI3FAIDoCUMI2hhcHJveHkv Oct 11 08:03:41 np0005481015 certmonger[39512]: b3ZlcmNsb3VkLm9vby50ZXN0QE9PTy5URVNUoEIGBisGAQUCAqA4MDagChsIT09P Oct 11 08:03:41 np0005481015 certmonger[39512]: LlRFU1ShKDAmoAMCAQGhHzAdGwdoYXByb3h5GxJvdmVyY2xvdWQub29vLnRlc3Qw Oct 11 08:03:41 np0005481015 certmonger[39512]: DQYJKoZIhvcNAQELBQADggGBALD/sFEUesMMfvGj7078OqpLNy0bxJ2zwpWrG/dQ Oct 11 08:03:41 np0005481015 certmonger[39512]: cx/z/UIBxNyI6wJ3u8I3jjolzKXes3rfSUjq5Gjimtl7XTFJnp2tLPI/rvcBZz0Y Oct 11 08:03:41 np0005481015 certmonger[39512]: B6y84t3g0m85qIYXSu06Bl2L+lZkUZQ5IStOr9FrPscycPkislr9dF4ifZPVjHtC Oct 11 08:03:41 np0005481015 certmonger[39512]: XSDVrOcsIUzOXISC7/Lz7x7AYNiCGDV9ijFE4dRT9iIRKfMiAQS6dqmxtnFIZHX5 Oct 11 08:03:41 np0005481015 certmonger[39512]: iJgGU40q6n0mHQ8wwd2ogWNIr/Eica+RtRvY3i//AUSl7R673Q81FYZTewJ55KFO Oct 11 08:03:41 np0005481015 certmonger[39512]: BfVk3YwClK8JIUH7UG0aESIucUlbGt538FoZjYWnFWhMbltPOc5qNRCt+bIozwpZ Oct 11 08:03:41 np0005481015 certmonger[39512]: 1/Ia3VUg7kGM+c8sj1d+lp2tjTWz5UHCAWT+gH64fuBqUfyb9qCp5iD2i2VuSy0/ Oct 11 08:03:41 np0005481015 certmonger[39512]: ScCX2ll2rZvxA+zoXQeLmytqt3OXYjmVGhENIaTuEsvnN648hY/ooyitpEthfspc Oct 11 08:03:41 np0005481015 certmonger[39512]: wz4dJP4yKXJKeDfVg3Z+MIlsJQ== Oct 11 08:03:41 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:03:41 np0005481015 certmonger[39512]: ". Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] No hooks set for pre-save command. Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:41 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:41 np0005481015 certmonger[41374]: Certificate in file "/etc/pki/tls/certs/haproxy-external-cert.crt" issued by CA and saved. Oct 11 08:03:41 np0005481015 certmonger[39512]: 2025-10-11 08:03:41 [39512] Wrote to /var/lib/certmonger/requests/20251011080340 Oct 11 08:03:42 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:43 np0005481015 python3[41390]: ansible-file Invoked with path=/etc/pki/tls/certs/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Oct 11 08:03:43 np0005481015 python3[41406]: ansible-file Invoked with path=/etc/pki/tls/private/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Oct 11 08:03:44 np0005481015 python3[41422]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:03:45 np0005481015 python3[41442]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:03:48 np0005481015 python3[41461]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:03:51 np0005481015 python3[41478]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:03:51 np0005481015 python3[41494]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:03:51 np0005481015 python3[41510]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:03:53 np0005481015 python3[41528]: ansible-certificate_request Invoked with name=haproxy-ctlplane-cert dns=['np0005481015.ctlplane.ooo.test', 'overcloud.ctlplane.ooo.test'] principal=['haproxy/np0005481015.ctlplane.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-ctlplane-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.crt"#012cp "/etc/pki/tls/private/haproxy-ctlplane-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-ctlplane.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-ctlplane.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:03:53 np0005481015 certmonger[39512]: 2025-10-11 08:03:53 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:53 np0005481015 certmonger[39512]: 2025-10-11 08:03:53 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:53 np0005481015 certmonger[39512]: 2025-10-11 08:03:53 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:53 np0005481015 certmonger[39512]: 2025-10-11 08:03:53 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:53 np0005481015 certmonger[39512]: 2025-10-11 08:03:53 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:53 np0005481015 certmonger[39512]: 2025-10-11 08:03:53 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:53 np0005481015 certmonger[39512]: 2025-10-11 08:03:53 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:53 np0005481015 certmonger[39512]: 2025-10-11 08:03:53 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:53 np0005481015 certmonger[39512]: 2025-10-11 08:03:53 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 certmonger[41538]: 2025-10-11 08:03:54 [41538] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481015.ctlplane.ooo.test" for child. Oct 11 08:03:54 np0005481015 certmonger[41538]: 2025-10-11 08:03:54 [41538] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481015.ctlplane.ooo.test Oct 11 08:03:54 np0005481015 certmonger[41538]: overcloud.ctlplane.ooo.test Oct 11 08:03:54 np0005481015 certmonger[41538]: " for child. Oct 11 08:03:54 np0005481015 certmonger[41538]: 2025-10-11 08:03:54 [41538] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005481015.ctlplane.ooo.test@OOO.TEST Oct 11 08:03:54 np0005481015 certmonger[41538]: " for child. Oct 11 08:03:54 np0005481015 certmonger[41538]: 2025-10-11 08:03:54 [41538] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:03:54 np0005481015 certmonger[41538]: 2025-10-11 08:03:54 [41538] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:03:54 np0005481015 certmonger[41538]: MIID6TCCAtECAQAwKTEnMCUGA1UEAxMebnAwMDA1NDgxMDE1LmN0bHBsYW5lLm9v Oct 11 08:03:54 np0005481015 certmonger[41538]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsRmkKGgCMHY5 Oct 11 08:03:54 np0005481015 certmonger[41538]: XUI5IAXB/W2yvfSoFTTpyIma9pEHjNjJAgcfXD7Ro5gPMLEXQ9wPN7wzYsGaWbrW Oct 11 08:03:54 np0005481015 certmonger[41538]: AmOVdlayB48EjD4KdsKDfKxKJ5ku1vnFvgWrIwRNQfW80ye9whrfrx+5sfCX+7w/ Oct 11 08:03:54 np0005481015 certmonger[41538]: gXsgCKSqkIYKenbra48fRe0yl82+b2VlDXIBsKOGnwmJoAI13h9tWsdAazHSOpGX Oct 11 08:03:54 np0005481015 certmonger[41538]: 6a366YP5KWcpFLoY1zpHn5RrFTFUNNu9R2wGJSVvJansOtIsO4gfJEJN8zCI4Ipo Oct 11 08:03:54 np0005481015 certmonger[41538]: tzx4sZ9Pi0rWzOIHaEx/Ukoux2DkHtCheAebI+sywi4fXd/hIaLJpkoPS2d/Bqbs Oct 11 08:03:54 np0005481015 certmonger[41538]: gMfz7WPNtQIDAQABoIIBeTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAwADEA Oct 11 08:03:54 np0005481015 certmonger[41538]: MQAwADgAMAAzADUAMzCCAUgGCSqGSIb3DQEJDjGCATkwggE1MAsGA1UdDwQEAwIF Oct 11 08:03:54 np0005481015 certmonger[41538]: oDCB2QYDVR0RBIHRMIHOgh5ucDAwMDU0ODEwMTUuY3RscGxhbmUub29vLnRlc3SC Oct 11 08:03:54 np0005481015 certmonger[41538]: G292ZXJjbG91ZC5jdGxwbGFuZS5vb28udGVzdKA/BgorBgEEAYI3FAIDoDEML2hh Oct 11 08:03:54 np0005481015 certmonger[41538]: cHJveHkvbnAwMDA1NDgxMDE1LmN0bHBsYW5lLm9vby50ZXN0QE9PTy5URVNUoE4G Oct 11 08:03:54 np0005481015 certmonger[41538]: BisGAQUCAqBEMEKgChsIT09PLlRFU1ShNDAyoAMCAQGhKzApGwdoYXByb3h5Gx5u Oct 11 08:03:54 np0005481015 certmonger[41538]: cDAwMDU0ODEwMTUuY3RscGxhbmUub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUH Oct 11 08:03:54 np0005481015 certmonger[41538]: AwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFDSIPYZ4Rl4URtxZ Oct 11 08:03:54 np0005481015 certmonger[41538]: pU7RlL2VRe9OMA0GCSqGSIb3DQEBCwUAA4IBAQBdbQ2PGA39Xgym9FTLDtV1PPXD Oct 11 08:03:54 np0005481015 certmonger[41538]: Op3JKZ+R1G1S1QGcBTyIc9d8AsqBtdYAu7grOcvpLsuuA2MkFhxrY1hmhO6c33f2 Oct 11 08:03:54 np0005481015 certmonger[41538]: 6CmSY8VT+1Gc7RDAqtjbVTHsLiplueFlx8UoO4M91U3nJCyfSDtB6AXaEJpM5a5C Oct 11 08:03:54 np0005481015 certmonger[41538]: Ml7L3GoAr5EuPxDTA9ssHOAu+p1uE1DVFytyULMlClOUz25wwsGGZCjSR7JfMxnu Oct 11 08:03:54 np0005481015 certmonger[41538]: n2uZCmIWAnYbTSDLxOYvns0AtcOm8L4Bh6GdVcAjNupCfNicSu5BFAcW62hrv4Ti Oct 11 08:03:54 np0005481015 certmonger[41538]: 32c1pu0DGdTJszEsm4lPtFPq0SDI9EXZuwgJAkSvN+gWS2aMXJd+jQhuv0c5 Oct 11 08:03:54 np0005481015 certmonger[41538]: -----END CERTIFICATE REQUEST----- Oct 11 08:03:54 np0005481015 certmonger[41538]: " for child. Oct 11 08:03:54 np0005481015 certmonger[41538]: 2025-10-11 08:03:54 [41538] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCxGaQoaAIwdjldQjkgBcH9bbK99KgVNOnIiZr2kQeM2MkCBx9cPtGjmA8wsRdD3A83vDNiwZpZutYCY5V2VrIHjwSMPgp2woN8rEonmS7W+cW+BasjBE1B9bzTJ73CGt+vH7mx8Jf7vD+BeyAIpKqQhgp6dutrjx9F7TKXzb5vZWUNcgGwo4afCYmgAjXeH21ax0BrMdI6kZfprfrpg/kpZykUuhjXOkeflGsVMVQ0271HbAYlJW8lqew60iw7iB8kQk3zMIjgimi3PHixn0+LStbM4gdoTH9SSi7HYOQe0KF4B5sj6zLCLh9d3+EhosmmSg9LZ38GpuyAx/PtY821AgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAZFNI//v62pxz2HAvZtKUeYAsi2PUutqQDbIXAurYH7/dBj+n0mDTWxdo9IZl4+tSe+nMcTOe+2RrY3KJBsAUXZ+cR2H6hxtO3xhApBHKqbvjg3yh34g43j0lVjeD7hoO1HP2C9RyzZuuX5ZQlMcwr/P0RjhsPEsC5w5VF4sMdfA3OdF9fJogiENqrqKm6UrMPlluKfLY6v4nIq22fy8EM7K5yHVE+6hy1QrgI+MV/g8wS8K0NBBBv/ShBJ2tdzNyuPhzsld7ivPQ2fadmF1sfa+YptBD5KCY7FIFNjV4goxvlXWumZhcWJlacrDnKs08RcIxDZEccprwUUnxSy7v0g==" for child. Oct 11 08:03:54 np0005481015 certmonger[41538]: 2025-10-11 08:03:54 [41538] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsRmkKGgCMHY5XUI5IAXB/W2yvfSoFTTpyIma9pEHjNjJAgcfXD7Ro5gPMLEXQ9wPN7wzYsGaWbrWAmOVdlayB48EjD4KdsKDfKxKJ5ku1vnFvgWrIwRNQfW80ye9whrfrx+5sfCX+7w/gXsgCKSqkIYKenbra48fRe0yl82+b2VlDXIBsKOGnwmJoAI13h9tWsdAazHSOpGX6a366YP5KWcpFLoY1zpHn5RrFTFUNNu9R2wGJSVvJansOtIsO4gfJEJN8zCI4Ipotzx4sZ9Pi0rWzOIHaEx/Ukoux2DkHtCheAebI+sywi4fXd/hIaLJpkoPS2d/BqbsgMfz7WPNtQIDAQAB" for child. Oct 11 08:03:54 np0005481015 certmonger[41538]: 2025-10-11 08:03:54 [41538] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:03:54 np0005481015 certmonger[41538]: 2025-10-11 08:03:54 [41538] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:03:54 np0005481015 certmonger[41538]: 2025-10-11 08:03:54 [41538] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:03:54 np0005481015 certmonger[41538]: 2025-10-11 08:03:54 [41538] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:03:54 np0005481015 certmonger[41538]: 2025-10-11 08:03:54 [41538] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 certmonger[41538]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:03:54 np0005481015 certmonger[41538]: Certificate: "MIIFbDCCA9SgAwIBAgIBLjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4MDM1NFoXDTI3MTAxMjA4MDM1NFowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALEZpChoAjB2OV1COSAFwf1tsr30qBU06ciJmvaRB4zYyQIHH1w+0aOYDzCxF0PcDze8M2LBmlm61gJjlXZWsgePBIw+CnbCg3ysSieZLtb5xb4FqyMETUH1vNMnvcIa368fubHwl/u8P4F7IAikqpCGCnp262uPH0XtMpfNvm9lZQ1yAbCjhp8JiaACNd4fbVrHQGsx0jqRl+mt+umD+SlnKRS6GNc6R5+UaxUxVDTbvUdsBiUlbyWp7DrSLDuIHyRCTfMwiOCKaLc8eLGfT4tK1sziB2hMf1JKLsdg5B7QoXgHmyPrMsIuH13f4SGiyaZKD0tnfwam7IDH8+1jzbUCAwEAAaOCAgAwggH8MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFN9wh/d6pQHr4TdgvpfwUGBZ15sZMIHZBgNVHREEgdEwgc6CHm5wMDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdIIbb3ZlcmNsb3VkLmN0bHBsYW5lLm9vby50ZXN0oD8GCisGAQQBgjcUAgOgMQwvaGFwcm94eS9ucDAwMDU0ODEwMTUuY3RscGxhbmUub29vLnRlc3RAT09PLlRFU1SgTgYGKwYBBQICoEQwQqAKGwhPT08uVEVTVKE0MDKgAwIBAaErMCkbB2hhcHJveHkbHm5wMDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAes2ZegLmdbhqhHYUnK1yo2piDqBKN3q8I9TaEo5ziFQg6uQWYDuLrhkHoSASDEGS/dcDHAcaS8pwN0Ix184sK9c1CO2FEBpl1jWjbDnab5csvyxdupRCRHslf8FDgqHx4G4IPbL7sDRNaJwjvrctdbDYwp+AtSZ6ZlYP7hBwFF6xfhw27gQx4lWn9TyfIpIrpAEfKVdQK/D1q8Le8Onv+0nKINfkLth/GOANZEgxC2kZfRnZFb92uI3ozoFevppRtDMDNdnCvP8mj5HJTnARtxCFj+za4wcGbXl3JHm4FLyITM5tIRk+3W5Vhjr11LP+7vamuVx0zhgP/HJkQGgXRQ1B6DJSD2feCrsBHVDlwYS/C2x2GTtf4UQW/rnrHf+fxnCMqOO2XbwemAELd4sauEw6q45Vk4ftLJU6i/EBk88E3a3W2Nc0g1wvNT+5R9+4i5GBmvnwBhOd4NxJALwzlGAABDoCek+C63lYXnADSJtYVhoG/FKjF7ck94pIgaE/" Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Certificate submission still ongoing. Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Certificate submission attempt complete. Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Child status = 0. Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Child output: Oct 11 08:03:54 np0005481015 certmonger[39512]: "-----BEGIN CERTIFICATE----- Oct 11 08:03:54 np0005481015 certmonger[39512]: MIIFbDCCA9SgAwIBAgIBLjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:54 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:54 np0005481015 certmonger[39512]: MDM1NFoXDTI3MTAxMjA4MDM1NFowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Oct 11 08:03:54 np0005481015 certmonger[39512]: BAMMHm5wMDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Oct 11 08:03:54 np0005481015 certmonger[39512]: AQEBBQADggEPADCCAQoCggEBALEZpChoAjB2OV1COSAFwf1tsr30qBU06ciJmvaR Oct 11 08:03:54 np0005481015 certmonger[39512]: B4zYyQIHH1w+0aOYDzCxF0PcDze8M2LBmlm61gJjlXZWsgePBIw+CnbCg3ysSieZ Oct 11 08:03:54 np0005481015 certmonger[39512]: Ltb5xb4FqyMETUH1vNMnvcIa368fubHwl/u8P4F7IAikqpCGCnp262uPH0XtMpfN Oct 11 08:03:54 np0005481015 certmonger[39512]: vm9lZQ1yAbCjhp8JiaACNd4fbVrHQGsx0jqRl+mt+umD+SlnKRS6GNc6R5+UaxUx Oct 11 08:03:54 np0005481015 certmonger[39512]: VDTbvUdsBiUlbyWp7DrSLDuIHyRCTfMwiOCKaLc8eLGfT4tK1sziB2hMf1JKLsdg Oct 11 08:03:54 np0005481015 certmonger[39512]: 5B7QoXgHmyPrMsIuH13f4SGiyaZKD0tnfwam7IDH8+1jzbUCAwEAAaOCAgAwggH8 Oct 11 08:03:54 np0005481015 certmonger[39512]: MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4w Oct 11 08:03:54 np0005481015 certmonger[39512]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Oct 11 08:03:54 np0005481015 certmonger[39512]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Oct 11 08:03:54 np0005481015 certmonger[39512]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Oct 11 08:03:54 np0005481015 certmonger[39512]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Oct 11 08:03:54 np0005481015 certmonger[39512]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFN9wh/d6pQHr4TdgvpfwUGBZ15sZ Oct 11 08:03:54 np0005481015 certmonger[39512]: MIHZBgNVHREEgdEwgc6CHm5wMDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdIIb Oct 11 08:03:54 np0005481015 certmonger[39512]: b3ZlcmNsb3VkLmN0bHBsYW5lLm9vby50ZXN0oD8GCisGAQQBgjcUAgOgMQwvaGFw Oct 11 08:03:54 np0005481015 certmonger[39512]: cm94eS9ucDAwMDU0ODEwMTUuY3RscGxhbmUub29vLnRlc3RAT09PLlRFU1SgTgYG Oct 11 08:03:54 np0005481015 certmonger[39512]: KwYBBQICoEQwQqAKGwhPT08uVEVTVKE0MDKgAwIBAaErMCkbB2hhcHJveHkbHm5w Oct 11 08:03:54 np0005481015 certmonger[39512]: MDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Oct 11 08:03:54 np0005481015 certmonger[39512]: es2ZegLmdbhqhHYUnK1yo2piDqBKN3q8I9TaEo5ziFQg6uQWYDuLrhkHoSASDEGS Oct 11 08:03:54 np0005481015 certmonger[39512]: /dcDHAcaS8pwN0Ix184sK9c1CO2FEBpl1jWjbDnab5csvyxdupRCRHslf8FDgqHx Oct 11 08:03:54 np0005481015 certmonger[39512]: 4G4IPbL7sDRNaJwjvrctdbDYwp+AtSZ6ZlYP7hBwFF6xfhw27gQx4lWn9TyfIpIr Oct 11 08:03:54 np0005481015 certmonger[39512]: pAEfKVdQK/D1q8Le8Onv+0nKINfkLth/GOANZEgxC2kZfRnZFb92uI3ozoFevppR Oct 11 08:03:54 np0005481015 certmonger[39512]: tDMDNdnCvP8mj5HJTnARtxCFj+za4wcGbXl3JHm4FLyITM5tIRk+3W5Vhjr11LP+ Oct 11 08:03:54 np0005481015 certmonger[39512]: 7vamuVx0zhgP/HJkQGgXRQ1B6DJSD2feCrsBHVDlwYS/C2x2GTtf4UQW/rnrHf+f Oct 11 08:03:54 np0005481015 certmonger[39512]: xnCMqOO2XbwemAELd4sauEw6q45Vk4ftLJU6i/EBk88E3a3W2Nc0g1wvNT+5R9+4 Oct 11 08:03:54 np0005481015 certmonger[39512]: i5GBmvnwBhOd4NxJALwzlGAABDoCek+C63lYXnADSJtYVhoG/FKjF7ck94pIgaE/ Oct 11 08:03:54 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:03:54 np0005481015 certmonger[39512]: " Oct 11 08:03:54 np0005481015 certmonger[41540]: 2025-10-11 08:03:54 [41540] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:03:54 np0005481015 certmonger[41540]: MIIFbDCCA9SgAwIBAgIBLjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:54 np0005481015 certmonger[41540]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:54 np0005481015 certmonger[41540]: MDM1NFoXDTI3MTAxMjA4MDM1NFowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Oct 11 08:03:54 np0005481015 certmonger[41540]: BAMMHm5wMDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Oct 11 08:03:54 np0005481015 certmonger[41540]: AQEBBQADggEPADCCAQoCggEBALEZpChoAjB2OV1COSAFwf1tsr30qBU06ciJmvaR Oct 11 08:03:54 np0005481015 certmonger[41540]: B4zYyQIHH1w+0aOYDzCxF0PcDze8M2LBmlm61gJjlXZWsgePBIw+CnbCg3ysSieZ Oct 11 08:03:54 np0005481015 certmonger[41540]: Ltb5xb4FqyMETUH1vNMnvcIa368fubHwl/u8P4F7IAikqpCGCnp262uPH0XtMpfN Oct 11 08:03:54 np0005481015 certmonger[41540]: vm9lZQ1yAbCjhp8JiaACNd4fbVrHQGsx0jqRl+mt+umD+SlnKRS6GNc6R5+UaxUx Oct 11 08:03:54 np0005481015 certmonger[41540]: VDTbvUdsBiUlbyWp7DrSLDuIHyRCTfMwiOCKaLc8eLGfT4tK1sziB2hMf1JKLsdg Oct 11 08:03:54 np0005481015 certmonger[41540]: 5B7QoXgHmyPrMsIuH13f4SGiyaZKD0tnfwam7IDH8+1jzbUCAwEAAaOCAgAwggH8 Oct 11 08:03:54 np0005481015 certmonger[41540]: MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4w Oct 11 08:03:54 np0005481015 certmonger[41540]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Oct 11 08:03:54 np0005481015 certmonger[41540]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Oct 11 08:03:54 np0005481015 certmonger[41540]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Oct 11 08:03:54 np0005481015 certmonger[41540]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Oct 11 08:03:54 np0005481015 certmonger[41540]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFN9wh/d6pQHr4TdgvpfwUGBZ15sZ Oct 11 08:03:54 np0005481015 certmonger[41540]: MIHZBgNVHREEgdEwgc6CHm5wMDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdIIb Oct 11 08:03:54 np0005481015 certmonger[41540]: b3ZlcmNsb3VkLmN0bHBsYW5lLm9vby50ZXN0oD8GCisGAQQBgjcUAgOgMQwvaGFw Oct 11 08:03:54 np0005481015 certmonger[41540]: cm94eS9ucDAwMDU0ODEwMTUuY3RscGxhbmUub29vLnRlc3RAT09PLlRFU1SgTgYG Oct 11 08:03:54 np0005481015 certmonger[41540]: KwYBBQICoEQwQqAKGwhPT08uVEVTVKE0MDKgAwIBAaErMCkbB2hhcHJveHkbHm5w Oct 11 08:03:54 np0005481015 certmonger[41540]: MDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Oct 11 08:03:54 np0005481015 certmonger[41540]: es2ZegLmdbhqhHYUnK1yo2piDqBKN3q8I9TaEo5ziFQg6uQWYDuLrhkHoSASDEGS Oct 11 08:03:54 np0005481015 certmonger[41540]: /dcDHAcaS8pwN0Ix184sK9c1CO2FEBpl1jWjbDnab5csvyxdupRCRHslf8FDgqHx Oct 11 08:03:54 np0005481015 certmonger[41540]: 4G4IPbL7sDRNaJwjvrctdbDYwp+AtSZ6ZlYP7hBwFF6xfhw27gQx4lWn9TyfIpIr Oct 11 08:03:54 np0005481015 certmonger[41540]: pAEfKVdQK/D1q8Le8Onv+0nKINfkLth/GOANZEgxC2kZfRnZFb92uI3ozoFevppR Oct 11 08:03:54 np0005481015 certmonger[41540]: tDMDNdnCvP8mj5HJTnARtxCFj+za4wcGbXl3JHm4FLyITM5tIRk+3W5Vhjr11LP+ Oct 11 08:03:54 np0005481015 certmonger[41540]: 7vamuVx0zhgP/HJkQGgXRQ1B6DJSD2feCrsBHVDlwYS/C2x2GTtf4UQW/rnrHf+f Oct 11 08:03:54 np0005481015 certmonger[41540]: xnCMqOO2XbwemAELd4sauEw6q45Vk4ftLJU6i/EBk88E3a3W2Nc0g1wvNT+5R9+4 Oct 11 08:03:54 np0005481015 certmonger[41540]: i5GBmvnwBhOd4NxJALwzlGAABDoCek+C63lYXnADSJtYVhoG/FKjF7ck94pIgaE/ Oct 11 08:03:54 np0005481015 certmonger[41540]: -----END CERTIFICATE----- Oct 11 08:03:54 np0005481015 certmonger[41540]: ". Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Certificate submission still ongoing. Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Certificate submission postprocessing complete. Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Child status = 0. Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Child output: Oct 11 08:03:54 np0005481015 certmonger[39512]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFbDCCA9SgAwIBAgIBLjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u\nVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4\nMDM1NFoXDTI3MTAxMjA4MDM1NFowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV\nBAMMHm5wMDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN\nAQEBBQADggEPADCCAQoCggEBALEZpChoAjB2OV1COSAFwf1tsr30qBU06ciJmvaR\nB4zYyQIHH1w+0aOYDzCxF0PcDze8M2LBmlm61gJjlXZWsgePBIw+CnbCg3ysSieZ\nLtb5xb4FqyMETUH1vNMnvcIa368fubHwl/u8P4F7IAikqpCGCnp262uPH0XtMpfN\nvm9lZQ1yAbCjhp8JiaACNd4fbVrHQGsx0jqRl+mt+umD+SlnKRS6GNc6R5+UaxUx\nVDTbvUdsBiUlbyWp7DrSLDuIHyRCTfMwiOCKaLc8eLGfT4tK1sziB2hMf1JKLsdg\n5B7QoXgHmyPrMsIuH13f4SGiyaZKD0tnfwam7IDH8+1jzbUCAwEAAaOCAgAwggH8\nMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4w\nLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G\nA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD\nVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h\nc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0\naWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFN9wh/d6pQHr4TdgvpfwUGBZ15sZ\nMIHZBgNVHREEgdEwgc6CHm5wMDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdIIb\nb3ZlcmNsb3VkLmN0bHBsYW5lLm9vby50ZXN0oD8GCisGAQQBgjcUAgOgMQwvaGFw\ncm94eS9ucDAwMDU0ODEwMTUuY3RscGxhbmUub29vLnRlc3RAT09PLlRFU1SgTgYG\nKwYBBQICoEQwQqAKGwhPT08uVEVTVKE0MDKgAwIBAaErMCkbB2hhcHJveHkbHm5w\nMDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA\nes2ZegLmdbhqhHYUnK1yo2piDqBKN3q8I9TaEo5ziFQg6uQWYDuLrhkHoSASDEGS\n/dcDHAcaS8pwN0Ix184sK9c1CO2FEBpl1jWjbDnab5csvyxdupRCRHslf8FDgqHx\n4G4IPbL7sDRNaJwjvrctdbDYwp+AtSZ6ZlYP7hBwFF6xfhw27gQx4lWn9TyfIpIr\npAEfKVdQK/D1q8Le8Onv+0nKINfkLth/GOANZEgxC2kZfRnZFb92uI3ozoFevppR\ntDMDNdnCvP8mj5HJTnARtxCFj+za4wcGbXl3JHm4FLyITM5tIRk+3W5Vhjr11LP+\n7vamuVx0zhgP/HJkQGgXRQ1B6DJSD2feCrsBHVDlwYS/C2x2GTtf4UQW/rnrHf+f\nxnCMqOO2XbwemAELd4sauEw6q45Vk4ftLJU6i/EBk88E3a3W2Nc0g1wvNT+5R9+4\ni5GBmvnwBhOd4NxJALwzlGAABDoCek+C63lYXnADSJtYVhoG/FKjF7ck94pIgaE/\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:03:54 np0005481015 certmonger[39512]: " Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:03:54 np0005481015 certmonger[39512]: MIIFbDCCA9SgAwIBAgIBLjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:54 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:54 np0005481015 certmonger[39512]: MDM1NFoXDTI3MTAxMjA4MDM1NFowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Oct 11 08:03:54 np0005481015 certmonger[39512]: BAMMHm5wMDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Oct 11 08:03:54 np0005481015 certmonger[39512]: AQEBBQADggEPADCCAQoCggEBALEZpChoAjB2OV1COSAFwf1tsr30qBU06ciJmvaR Oct 11 08:03:54 np0005481015 certmonger[39512]: B4zYyQIHH1w+0aOYDzCxF0PcDze8M2LBmlm61gJjlXZWsgePBIw+CnbCg3ysSieZ Oct 11 08:03:54 np0005481015 certmonger[39512]: Ltb5xb4FqyMETUH1vNMnvcIa368fubHwl/u8P4F7IAikqpCGCnp262uPH0XtMpfN Oct 11 08:03:54 np0005481015 certmonger[39512]: vm9lZQ1yAbCjhp8JiaACNd4fbVrHQGsx0jqRl+mt+umD+SlnKRS6GNc6R5+UaxUx Oct 11 08:03:54 np0005481015 certmonger[39512]: VDTbvUdsBiUlbyWp7DrSLDuIHyRCTfMwiOCKaLc8eLGfT4tK1sziB2hMf1JKLsdg Oct 11 08:03:54 np0005481015 certmonger[39512]: 5B7QoXgHmyPrMsIuH13f4SGiyaZKD0tnfwam7IDH8+1jzbUCAwEAAaOCAgAwggH8 Oct 11 08:03:54 np0005481015 certmonger[39512]: MB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4w Oct 11 08:03:54 np0005481015 certmonger[39512]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Oct 11 08:03:54 np0005481015 certmonger[39512]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Oct 11 08:03:54 np0005481015 certmonger[39512]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Oct 11 08:03:54 np0005481015 certmonger[39512]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Oct 11 08:03:54 np0005481015 certmonger[39512]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFN9wh/d6pQHr4TdgvpfwUGBZ15sZ Oct 11 08:03:54 np0005481015 certmonger[39512]: MIHZBgNVHREEgdEwgc6CHm5wMDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdIIb Oct 11 08:03:54 np0005481015 certmonger[39512]: b3ZlcmNsb3VkLmN0bHBsYW5lLm9vby50ZXN0oD8GCisGAQQBgjcUAgOgMQwvaGFw Oct 11 08:03:54 np0005481015 certmonger[39512]: cm94eS9ucDAwMDU0ODEwMTUuY3RscGxhbmUub29vLnRlc3RAT09PLlRFU1SgTgYG Oct 11 08:03:54 np0005481015 certmonger[39512]: KwYBBQICoEQwQqAKGwhPT08uVEVTVKE0MDKgAwIBAaErMCkbB2hhcHJveHkbHm5w Oct 11 08:03:54 np0005481015 certmonger[39512]: MDAwNTQ4MTAxNS5jdGxwbGFuZS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Oct 11 08:03:54 np0005481015 certmonger[39512]: es2ZegLmdbhqhHYUnK1yo2piDqBKN3q8I9TaEo5ziFQg6uQWYDuLrhkHoSASDEGS Oct 11 08:03:54 np0005481015 certmonger[39512]: /dcDHAcaS8pwN0Ix184sK9c1CO2FEBpl1jWjbDnab5csvyxdupRCRHslf8FDgqHx Oct 11 08:03:54 np0005481015 certmonger[39512]: 4G4IPbL7sDRNaJwjvrctdbDYwp+AtSZ6ZlYP7hBwFF6xfhw27gQx4lWn9TyfIpIr Oct 11 08:03:54 np0005481015 certmonger[39512]: pAEfKVdQK/D1q8Le8Onv+0nKINfkLth/GOANZEgxC2kZfRnZFb92uI3ozoFevppR Oct 11 08:03:54 np0005481015 certmonger[39512]: tDMDNdnCvP8mj5HJTnARtxCFj+za4wcGbXl3JHm4FLyITM5tIRk+3W5Vhjr11LP+ Oct 11 08:03:54 np0005481015 certmonger[39512]: 7vamuVx0zhgP/HJkQGgXRQ1B6DJSD2feCrsBHVDlwYS/C2x2GTtf4UQW/rnrHf+f Oct 11 08:03:54 np0005481015 certmonger[39512]: xnCMqOO2XbwemAELd4sauEw6q45Vk4ftLJU6i/EBk88E3a3W2Nc0g1wvNT+5R9+4 Oct 11 08:03:54 np0005481015 certmonger[39512]: i5GBmvnwBhOd4NxJALwzlGAABDoCek+C63lYXnADSJtYVhoG/FKjF7ck94pIgaE/ Oct 11 08:03:54 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:03:54 np0005481015 certmonger[39512]: ". Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] No hooks set for pre-save command. Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 certmonger[39512]: 2025-10-11 08:03:54 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:54 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:55 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:55 np0005481015 certmonger[39512]: 2025-10-11 08:03:55 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:55 np0005481015 certmonger[39512]: 2025-10-11 08:03:55 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:55 np0005481015 certmonger[41614]: Certificate in file "/etc/pki/tls/certs/haproxy-ctlplane-cert.crt" issued by CA and saved. Oct 11 08:03:55 np0005481015 certmonger[39512]: 2025-10-11 08:03:55 [39512] Wrote to /var/lib/certmonger/requests/20251011080353 Oct 11 08:03:55 np0005481015 python3[41630]: ansible-certificate_request Invoked with name=haproxy-storage-cert dns=['np0005481015.storage.ooo.test', 'overcloud.storage.ooo.test'] principal=['haproxy/np0005481015.storage.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-storage-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.crt"#012cp "/etc/pki/tls/private/haproxy-storage-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-storage.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-storage.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:03:55 np0005481015 certmonger[39512]: 2025-10-11 08:03:55 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:55 np0005481015 certmonger[39512]: 2025-10-11 08:03:55 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:55 np0005481015 certmonger[39512]: 2025-10-11 08:03:55 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:55 np0005481015 certmonger[39512]: 2025-10-11 08:03:55 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:55 np0005481015 certmonger[39512]: 2025-10-11 08:03:55 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:55 np0005481015 certmonger[39512]: 2025-10-11 08:03:55 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:55 np0005481015 certmonger[39512]: 2025-10-11 08:03:55 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:55 np0005481015 certmonger[39512]: 2025-10-11 08:03:55 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:55 np0005481015 certmonger[39512]: 2025-10-11 08:03:55 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:55 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:56 np0005481015 certmonger[41640]: 2025-10-11 08:03:56 [41640] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481015.storage.ooo.test" for child. Oct 11 08:03:56 np0005481015 certmonger[41640]: 2025-10-11 08:03:56 [41640] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481015.storage.ooo.test Oct 11 08:03:56 np0005481015 certmonger[41640]: overcloud.storage.ooo.test Oct 11 08:03:56 np0005481015 certmonger[41640]: " for child. Oct 11 08:03:56 np0005481015 certmonger[41640]: 2025-10-11 08:03:56 [41640] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005481015.storage.ooo.test@OOO.TEST Oct 11 08:03:56 np0005481015 certmonger[41640]: " for child. Oct 11 08:03:56 np0005481015 certmonger[41640]: 2025-10-11 08:03:56 [41640] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:03:56 np0005481015 certmonger[41640]: 2025-10-11 08:03:56 [41640] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:03:56 np0005481015 certmonger[41640]: MIID5DCCAswCAQAwKDEmMCQGA1UEAxMdbnAwMDA1NDgxMDE1LnN0b3JhZ2Uub29v Oct 11 08:03:56 np0005481015 certmonger[41640]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC83NfRZT1gZN3T Oct 11 08:03:56 np0005481015 certmonger[41640]: h4sciQSgWRkOvYQI16oG7sdhZn9L2bPMS/N0aNm+MdeHc4AkMY/3lhPFQEjK7tEU Oct 11 08:03:56 np0005481015 certmonger[41640]: xff9TdodvwTj9euLCsD9NuKpgZu0PTbp5suyOKz+X7217PR4FY05FyNqsV/sqnIa Oct 11 08:03:56 np0005481015 certmonger[41640]: q0ZxaULyQ8XvYsvVxIWnBIaQGRKSsbX3ddPRnQz3xz0kn8aAqXVKPJ6rlqBezCwm Oct 11 08:03:56 np0005481015 certmonger[41640]: 0rzGT6u5qvqcjhcVRZ3NUXPnUJaVPt1zV7c1iSeyrW+t1lf2ptybUCOa7A6gSiox Oct 11 08:03:56 np0005481015 certmonger[41640]: CtVTv8Re/fiuWKVs8Xj+UMAlgAi1NtrX5SMhxC3Nqj+kCA+Hd9CCI24m5EZU/QUf Oct 11 08:03:56 np0005481015 certmonger[41640]: SLZM9VyXAgMBAAGgggF1MCsGCSqGSIb3DQEJFDEeHhwAMgAwADIANQAxADAAMQAx Oct 11 08:03:56 np0005481015 certmonger[41640]: ADAAOAAwADMANQA1MIIBRAYJKoZIhvcNAQkOMYIBNTCCATEwCwYDVR0PBAQDAgWg Oct 11 08:03:56 np0005481015 certmonger[41640]: MIHVBgNVHREEgc0wgcqCHW5wMDAwNTQ4MTAxNS5zdG9yYWdlLm9vby50ZXN0ghpv Oct 11 08:03:56 np0005481015 certmonger[41640]: dmVyY2xvdWQuc3RvcmFnZS5vb28udGVzdKA+BgorBgEEAYI3FAIDoDAMLmhhcHJv Oct 11 08:03:56 np0005481015 certmonger[41640]: eHkvbnAwMDA1NDgxMDE1LnN0b3JhZ2Uub29vLnRlc3RAT09PLlRFU1SgTQYGKwYB Oct 11 08:03:56 np0005481015 certmonger[41640]: BQICoEMwQaAKGwhPT08uVEVTVKEzMDGgAwIBAaEqMCgbB2hhcHJveHkbHW5wMDAw Oct 11 08:03:56 np0005481015 certmonger[41640]: NTQ4MTAxNS5zdG9yYWdlLm9vby50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggr Oct 11 08:03:56 np0005481015 certmonger[41640]: BgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQ0iD2GeEZeFEbcWaVO0ZS9 Oct 11 08:03:56 np0005481015 certmonger[41640]: lUXvTjANBgkqhkiG9w0BAQsFAAOCAQEAsdUyJkYguqgvFPWN4KgCZpsfNiFqVdRz Oct 11 08:03:56 np0005481015 certmonger[41640]: JA4O8M4st9JiEHEkT6AUNhmLWBtgMqCxCf3OSS3zTtxARQNGh3BZgjxehAN87Q1j Oct 11 08:03:56 np0005481015 certmonger[41640]: j8QjPJ/ErduBwD0f6Cq2ebu+9STBe669qYEL9kP3G235C83glnrQ3ljgkwp6Shnx Oct 11 08:03:56 np0005481015 certmonger[41640]: L4rVRWpUhuqKcjjJQoJZFfPki4p3wLnnxwTLJQOAUmXE4qtiNKWogGBIXZDhw5gE Oct 11 08:03:56 np0005481015 certmonger[41640]: S4D9SE6HviD46F+SQwsNSSp2QaC4Kd0Zgvt9dvnJWFbEMrLTfmMFRDPhtxP3I+Ur Oct 11 08:03:56 np0005481015 certmonger[41640]: 0KQkhnJ0WWeZJ+vIw/BW2MnHoAHOCMvIl3hmcOYtsG1AOJfq+2NoKg== Oct 11 08:03:56 np0005481015 certmonger[41640]: -----END CERTIFICATE REQUEST----- Oct 11 08:03:56 np0005481015 certmonger[41640]: " for child. Oct 11 08:03:56 np0005481015 certmonger[41640]: 2025-10-11 08:03:56 [41640] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:03:56 np0005481015 certmonger[41640]: 2025-10-11 08:03:56 [41640] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvNzX0WU9YGTd04eLHIkEoFkZDr2ECNeqBu7HYWZ/S9mzzEvzdGjZvjHXh3OAJDGP95YTxUBIyu7RFMX3/U3aHb8E4/XriwrA/TbiqYGbtD026ebLsjis/l+9tez0eBWNORcjarFf7KpyGqtGcWlC8kPF72LL1cSFpwSGkBkSkrG193XT0Z0M98c9JJ/GgKl1Sjyeq5agXswsJtK8xk+ruar6nI4XFUWdzVFz51CWlT7dc1e3NYknsq1vrdZX9qbcm1AjmuwOoEoqMQrVU7/EXv34rlilbPF4/lDAJYAItTba1+UjIcQtzao/pAgPh3fQgiNuJuRGVP0FH0i2TPVclwIDAQAB" for child. Oct 11 08:03:56 np0005481015 certmonger[41640]: 2025-10-11 08:03:56 [41640] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:03:56 np0005481015 certmonger[41640]: 2025-10-11 08:03:56 [41640] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:03:56 np0005481015 certmonger[41640]: 2025-10-11 08:03:56 [41640] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:03:56 np0005481015 certmonger[41640]: 2025-10-11 08:03:56 [41640] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:03:56 np0005481015 certmonger[41640]: 2025-10-11 08:03:56 [41640] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:56 np0005481015 certmonger[41640]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:03:56 np0005481015 certmonger[41640]: Certificate: "MIIFZzCCA8+gAwIBAgIBMTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4MDM1NloXDTI3MTAxMjA4MDM1NlowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNVBAMMHW5wMDAwNTQ4MTAxNS5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvNzX0WU9YGTd04eLHIkEoFkZDr2ECNeqBu7HYWZ/S9mzzEvzdGjZvjHXh3OAJDGP95YTxUBIyu7RFMX3/U3aHb8E4/XriwrA/TbiqYGbtD026ebLsjis/l+9tez0eBWNORcjarFf7KpyGqtGcWlC8kPF72LL1cSFpwSGkBkSkrG193XT0Z0M98c9JJ/GgKl1Sjyeq5agXswsJtK8xk+ruar6nI4XFUWdzVFz51CWlT7dc1e3NYknsq1vrdZX9qbcm1AjmuwOoEoqMQrVU7/EXv34rlilbPF4/lDAJYAItTba1+UjIcQtzao/pAgPh3fQgiNuJuRGVP0FH0i2TPVclwIDAQABo4IB/DCCAfgwHwYDVR0jBBgwFoAUpmo3qgn1Gyf8p8PaklOw1w0+KGkwOgYIKwYBBQUHAQEELjAsMCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYDVR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNVHR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFzdGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUf5WsvsdPjpdHSWNrxktqZ0vNNTQwgdUGA1UdEQSBzTCByoIdbnAwMDA1NDgxMDE1LnN0b3JhZ2Uub29vLnRlc3SCGm92ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQBgjcUAgOgMAwuaGFwcm94eS9ucDAwMDU0ODEwMTUuc3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBNBgYrBgEFAgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsHaGFwcm94eRsdbnAwMDA1NDgxMDE1LnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAKE3NMXhMKyz1fodjiVO+3f6sxqLj/HahL+5zN2aUS3Aam+a+JrfvnyReWMIFCGl6LbGlLp7TZ/6xoZmP267pD+SrQWvQKJ497oWdb6FUQZ2mFLKF9m77/hzlH/IVnltwuoYzKtOdo+uzvFwUye8GcZOYCIUjYxLFof/nCUbX6yKIB0cNr9/QUVC4wOOzrKDoGnwEzvf3zS3amvAjEnZCOHj7scP7kB8cJbOS7T5OkUy+7tXsG5RfmRKZ1GGWTWl0dOF2ljQ8ezLFoxgYX/052WMRfWaZpg+6LT4w7G8Dtzp/nMycctUnJ2NuH1Odruc0L8VI1ipy/dSX1zT8WxDCQ8MjxiF6urP+gDcd+GSSkbqycCMW932Igjs6TPHCIY29B/dmkY4eU6Mo2HMlz+zjfJU6KJpVliIX3CFA9EmWSwMGVBOk2y4DfTgcaM7zpLCcDgAH1+0uqsPQUsNbKaRzGP43xoGIj7dkF9o41y21Nanrok2wSAG9PYdl6dN1kjpOg==" Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Certificate submission still ongoing. Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Certificate submission attempt complete. Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Child status = 0. Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Child output: Oct 11 08:03:56 np0005481015 certmonger[39512]: "-----BEGIN CERTIFICATE----- Oct 11 08:03:56 np0005481015 certmonger[39512]: MIIFZzCCA8+gAwIBAgIBMTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:56 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:56 np0005481015 certmonger[39512]: MDM1NloXDTI3MTAxMjA4MDM1NlowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Oct 11 08:03:56 np0005481015 certmonger[39512]: BAMMHW5wMDAwNTQ4MTAxNS5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Oct 11 08:03:56 np0005481015 certmonger[39512]: AQEFAAOCAQ8AMIIBCgKCAQEAvNzX0WU9YGTd04eLHIkEoFkZDr2ECNeqBu7HYWZ/ Oct 11 08:03:56 np0005481015 certmonger[39512]: S9mzzEvzdGjZvjHXh3OAJDGP95YTxUBIyu7RFMX3/U3aHb8E4/XriwrA/TbiqYGb Oct 11 08:03:56 np0005481015 certmonger[39512]: tD026ebLsjis/l+9tez0eBWNORcjarFf7KpyGqtGcWlC8kPF72LL1cSFpwSGkBkS Oct 11 08:03:56 np0005481015 certmonger[39512]: krG193XT0Z0M98c9JJ/GgKl1Sjyeq5agXswsJtK8xk+ruar6nI4XFUWdzVFz51CW Oct 11 08:03:56 np0005481015 certmonger[39512]: lT7dc1e3NYknsq1vrdZX9qbcm1AjmuwOoEoqMQrVU7/EXv34rlilbPF4/lDAJYAI Oct 11 08:03:56 np0005481015 certmonger[39512]: tTba1+UjIcQtzao/pAgPh3fQgiNuJuRGVP0FH0i2TPVclwIDAQABo4IB/DCCAfgw Oct 11 08:03:56 np0005481015 certmonger[39512]: HwYDVR0jBBgwFoAUpmo3qgn1Gyf8p8PaklOw1w0+KGkwOgYIKwYBBQUHAQEELjAs Oct 11 08:03:56 np0005481015 certmonger[39512]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Oct 11 08:03:56 np0005481015 certmonger[39512]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Oct 11 08:03:56 np0005481015 certmonger[39512]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Oct 11 08:03:56 np0005481015 certmonger[39512]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Oct 11 08:03:56 np0005481015 certmonger[39512]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUf5WsvsdPjpdHSWNrxktqZ0vNNTQw Oct 11 08:03:56 np0005481015 certmonger[39512]: gdUGA1UdEQSBzTCByoIdbnAwMDA1NDgxMDE1LnN0b3JhZ2Uub29vLnRlc3SCGm92 Oct 11 08:03:56 np0005481015 certmonger[39512]: ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQBgjcUAgOgMAwuaGFwcm94 Oct 11 08:03:56 np0005481015 certmonger[39512]: eS9ucDAwMDU0ODEwMTUuc3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBNBgYrBgEF Oct 11 08:03:56 np0005481015 certmonger[39512]: AgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsHaGFwcm94eRsdbnAwMDA1 Oct 11 08:03:56 np0005481015 certmonger[39512]: NDgxMDE1LnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAKE3NMXh Oct 11 08:03:56 np0005481015 certmonger[39512]: MKyz1fodjiVO+3f6sxqLj/HahL+5zN2aUS3Aam+a+JrfvnyReWMIFCGl6LbGlLp7 Oct 11 08:03:56 np0005481015 certmonger[39512]: TZ/6xoZmP267pD+SrQWvQKJ497oWdb6FUQZ2mFLKF9m77/hzlH/IVnltwuoYzKtO Oct 11 08:03:56 np0005481015 certmonger[39512]: do+uzvFwUye8GcZOYCIUjYxLFof/nCUbX6yKIB0cNr9/QUVC4wOOzrKDoGnwEzvf Oct 11 08:03:56 np0005481015 certmonger[39512]: 3zS3amvAjEnZCOHj7scP7kB8cJbOS7T5OkUy+7tXsG5RfmRKZ1GGWTWl0dOF2ljQ Oct 11 08:03:56 np0005481015 certmonger[39512]: 8ezLFoxgYX/052WMRfWaZpg+6LT4w7G8Dtzp/nMycctUnJ2NuH1Odruc0L8VI1ip Oct 11 08:03:56 np0005481015 certmonger[39512]: y/dSX1zT8WxDCQ8MjxiF6urP+gDcd+GSSkbqycCMW932Igjs6TPHCIY29B/dmkY4 Oct 11 08:03:56 np0005481015 certmonger[39512]: eU6Mo2HMlz+zjfJU6KJpVliIX3CFA9EmWSwMGVBOk2y4DfTgcaM7zpLCcDgAH1+0 Oct 11 08:03:56 np0005481015 certmonger[39512]: uqsPQUsNbKaRzGP43xoGIj7dkF9o41y21Nanrok2wSAG9PYdl6dN1kjpOg== Oct 11 08:03:56 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:03:56 np0005481015 certmonger[39512]: " Oct 11 08:03:56 np0005481015 certmonger[41642]: 2025-10-11 08:03:56 [41642] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:03:56 np0005481015 certmonger[41642]: MIIFZzCCA8+gAwIBAgIBMTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:56 np0005481015 certmonger[41642]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:56 np0005481015 certmonger[41642]: MDM1NloXDTI3MTAxMjA4MDM1NlowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Oct 11 08:03:56 np0005481015 certmonger[41642]: BAMMHW5wMDAwNTQ4MTAxNS5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Oct 11 08:03:56 np0005481015 certmonger[41642]: AQEFAAOCAQ8AMIIBCgKCAQEAvNzX0WU9YGTd04eLHIkEoFkZDr2ECNeqBu7HYWZ/ Oct 11 08:03:56 np0005481015 certmonger[41642]: S9mzzEvzdGjZvjHXh3OAJDGP95YTxUBIyu7RFMX3/U3aHb8E4/XriwrA/TbiqYGb Oct 11 08:03:56 np0005481015 certmonger[41642]: tD026ebLsjis/l+9tez0eBWNORcjarFf7KpyGqtGcWlC8kPF72LL1cSFpwSGkBkS Oct 11 08:03:56 np0005481015 certmonger[41642]: krG193XT0Z0M98c9JJ/GgKl1Sjyeq5agXswsJtK8xk+ruar6nI4XFUWdzVFz51CW Oct 11 08:03:56 np0005481015 certmonger[41642]: lT7dc1e3NYknsq1vrdZX9qbcm1AjmuwOoEoqMQrVU7/EXv34rlilbPF4/lDAJYAI Oct 11 08:03:56 np0005481015 certmonger[41642]: tTba1+UjIcQtzao/pAgPh3fQgiNuJuRGVP0FH0i2TPVclwIDAQABo4IB/DCCAfgw Oct 11 08:03:56 np0005481015 certmonger[41642]: HwYDVR0jBBgwFoAUpmo3qgn1Gyf8p8PaklOw1w0+KGkwOgYIKwYBBQUHAQEELjAs Oct 11 08:03:56 np0005481015 certmonger[41642]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Oct 11 08:03:56 np0005481015 certmonger[41642]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Oct 11 08:03:56 np0005481015 certmonger[41642]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Oct 11 08:03:56 np0005481015 certmonger[41642]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Oct 11 08:03:56 np0005481015 certmonger[41642]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUf5WsvsdPjpdHSWNrxktqZ0vNNTQw Oct 11 08:03:56 np0005481015 certmonger[41642]: gdUGA1UdEQSBzTCByoIdbnAwMDA1NDgxMDE1LnN0b3JhZ2Uub29vLnRlc3SCGm92 Oct 11 08:03:56 np0005481015 certmonger[41642]: ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQBgjcUAgOgMAwuaGFwcm94 Oct 11 08:03:56 np0005481015 certmonger[41642]: eS9ucDAwMDU0ODEwMTUuc3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBNBgYrBgEF Oct 11 08:03:56 np0005481015 certmonger[41642]: AgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsHaGFwcm94eRsdbnAwMDA1 Oct 11 08:03:56 np0005481015 certmonger[41642]: NDgxMDE1LnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAKE3NMXh Oct 11 08:03:56 np0005481015 certmonger[41642]: MKyz1fodjiVO+3f6sxqLj/HahL+5zN2aUS3Aam+a+JrfvnyReWMIFCGl6LbGlLp7 Oct 11 08:03:56 np0005481015 certmonger[41642]: TZ/6xoZmP267pD+SrQWvQKJ497oWdb6FUQZ2mFLKF9m77/hzlH/IVnltwuoYzKtO Oct 11 08:03:56 np0005481015 certmonger[41642]: do+uzvFwUye8GcZOYCIUjYxLFof/nCUbX6yKIB0cNr9/QUVC4wOOzrKDoGnwEzvf Oct 11 08:03:56 np0005481015 certmonger[41642]: 3zS3amvAjEnZCOHj7scP7kB8cJbOS7T5OkUy+7tXsG5RfmRKZ1GGWTWl0dOF2ljQ Oct 11 08:03:56 np0005481015 certmonger[41642]: 8ezLFoxgYX/052WMRfWaZpg+6LT4w7G8Dtzp/nMycctUnJ2NuH1Odruc0L8VI1ip Oct 11 08:03:56 np0005481015 certmonger[41642]: y/dSX1zT8WxDCQ8MjxiF6urP+gDcd+GSSkbqycCMW932Igjs6TPHCIY29B/dmkY4 Oct 11 08:03:56 np0005481015 certmonger[41642]: eU6Mo2HMlz+zjfJU6KJpVliIX3CFA9EmWSwMGVBOk2y4DfTgcaM7zpLCcDgAH1+0 Oct 11 08:03:56 np0005481015 certmonger[41642]: uqsPQUsNbKaRzGP43xoGIj7dkF9o41y21Nanrok2wSAG9PYdl6dN1kjpOg== Oct 11 08:03:56 np0005481015 certmonger[41642]: -----END CERTIFICATE----- Oct 11 08:03:56 np0005481015 certmonger[41642]: ". Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Certificate submission still ongoing. Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Certificate submission postprocessing complete. Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Child status = 0. Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Child output: Oct 11 08:03:56 np0005481015 certmonger[39512]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nuqsPQUsNbKaRzGP43xoGIj7dkF9o41y21Nanrok2wSAG9PYdl6dN1kjpOg==\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:03:56 np0005481015 certmonger[39512]: " Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:03:56 np0005481015 certmonger[39512]: MIIFZzCCA8+gAwIBAgIBMTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:56 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:56 np0005481015 certmonger[39512]: MDM1NloXDTI3MTAxMjA4MDM1NlowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Oct 11 08:03:56 np0005481015 certmonger[39512]: BAMMHW5wMDAwNTQ4MTAxNS5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Oct 11 08:03:56 np0005481015 certmonger[39512]: AQEFAAOCAQ8AMIIBCgKCAQEAvNzX0WU9YGTd04eLHIkEoFkZDr2ECNeqBu7HYWZ/ Oct 11 08:03:56 np0005481015 certmonger[39512]: S9mzzEvzdGjZvjHXh3OAJDGP95YTxUBIyu7RFMX3/U3aHb8E4/XriwrA/TbiqYGb Oct 11 08:03:56 np0005481015 certmonger[39512]: tD026ebLsjis/l+9tez0eBWNORcjarFf7KpyGqtGcWlC8kPF72LL1cSFpwSGkBkS Oct 11 08:03:56 np0005481015 certmonger[39512]: krG193XT0Z0M98c9JJ/GgKl1Sjyeq5agXswsJtK8xk+ruar6nI4XFUWdzVFz51CW Oct 11 08:03:56 np0005481015 certmonger[39512]: lT7dc1e3NYknsq1vrdZX9qbcm1AjmuwOoEoqMQrVU7/EXv34rlilbPF4/lDAJYAI Oct 11 08:03:56 np0005481015 certmonger[39512]: tTba1+UjIcQtzao/pAgPh3fQgiNuJuRGVP0FH0i2TPVclwIDAQABo4IB/DCCAfgw Oct 11 08:03:56 np0005481015 certmonger[39512]: HwYDVR0jBBgwFoAUpmo3qgn1Gyf8p8PaklOw1w0+KGkwOgYIKwYBBQUHAQEELjAs Oct 11 08:03:56 np0005481015 certmonger[39512]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Oct 11 08:03:56 np0005481015 certmonger[39512]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Oct 11 08:03:56 np0005481015 certmonger[39512]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Oct 11 08:03:56 np0005481015 certmonger[39512]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Oct 11 08:03:56 np0005481015 certmonger[39512]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUf5WsvsdPjpdHSWNrxktqZ0vNNTQw Oct 11 08:03:56 np0005481015 certmonger[39512]: gdUGA1UdEQSBzTCByoIdbnAwMDA1NDgxMDE1LnN0b3JhZ2Uub29vLnRlc3SCGm92 Oct 11 08:03:56 np0005481015 certmonger[39512]: ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQBgjcUAgOgMAwuaGFwcm94 Oct 11 08:03:56 np0005481015 certmonger[39512]: eS9ucDAwMDU0ODEwMTUuc3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBNBgYrBgEF Oct 11 08:03:56 np0005481015 certmonger[39512]: AgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsHaGFwcm94eRsdbnAwMDA1 Oct 11 08:03:56 np0005481015 certmonger[39512]: NDgxMDE1LnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAKE3NMXh Oct 11 08:03:56 np0005481015 certmonger[39512]: MKyz1fodjiVO+3f6sxqLj/HahL+5zN2aUS3Aam+a+JrfvnyReWMIFCGl6LbGlLp7 Oct 11 08:03:56 np0005481015 certmonger[39512]: TZ/6xoZmP267pD+SrQWvQKJ497oWdb6FUQZ2mFLKF9m77/hzlH/IVnltwuoYzKtO Oct 11 08:03:56 np0005481015 certmonger[39512]: do+uzvFwUye8GcZOYCIUjYxLFof/nCUbX6yKIB0cNr9/QUVC4wOOzrKDoGnwEzvf Oct 11 08:03:56 np0005481015 certmonger[39512]: 3zS3amvAjEnZCOHj7scP7kB8cJbOS7T5OkUy+7tXsG5RfmRKZ1GGWTWl0dOF2ljQ Oct 11 08:03:56 np0005481015 certmonger[39512]: 8ezLFoxgYX/052WMRfWaZpg+6LT4w7G8Dtzp/nMycctUnJ2NuH1Odruc0L8VI1ip Oct 11 08:03:56 np0005481015 certmonger[39512]: y/dSX1zT8WxDCQ8MjxiF6urP+gDcd+GSSkbqycCMW932Igjs6TPHCIY29B/dmkY4 Oct 11 08:03:56 np0005481015 certmonger[39512]: eU6Mo2HMlz+zjfJU6KJpVliIX3CFA9EmWSwMGVBOk2y4DfTgcaM7zpLCcDgAH1+0 Oct 11 08:03:56 np0005481015 certmonger[39512]: uqsPQUsNbKaRzGP43xoGIj7dkF9o41y21Nanrok2wSAG9PYdl6dN1kjpOg== Oct 11 08:03:56 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:03:56 np0005481015 certmonger[39512]: ". Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] No hooks set for pre-save command. Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:56 np0005481015 certmonger[39512]: 2025-10-11 08:03:56 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:56 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:57 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:57 np0005481015 certmonger[39512]: 2025-10-11 08:03:57 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:57 np0005481015 certmonger[39512]: 2025-10-11 08:03:57 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:57 np0005481015 certmonger[41778]: Certificate in file "/etc/pki/tls/certs/haproxy-storage-cert.crt" issued by CA and saved. Oct 11 08:03:57 np0005481015 certmonger[39512]: 2025-10-11 08:03:57 [39512] Wrote to /var/lib/certmonger/requests/20251011080355 Oct 11 08:03:57 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:58 np0005481015 python3[41987]: ansible-certificate_request Invoked with name=haproxy-storage_mgmt-cert dns=['np0005481015.storagemgmt.ooo.test', 'overcloud.storagemgmt.ooo.test'] principal=['haproxy/np0005481015.storagemgmt.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-storage_mgmt-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.crt"#012cp "/etc/pki/tls/private/haproxy-storage_mgmt-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-storage_mgmt.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-storage_mgmt.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[41997]: 2025-10-11 08:03:58 [41997] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481015.storagemgmt.ooo.test" for child. Oct 11 08:03:58 np0005481015 certmonger[41997]: 2025-10-11 08:03:58 [41997] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481015.storagemgmt.ooo.test Oct 11 08:03:58 np0005481015 certmonger[41997]: overcloud.storagemgmt.ooo.test Oct 11 08:03:58 np0005481015 certmonger[41997]: " for child. Oct 11 08:03:58 np0005481015 certmonger[41997]: 2025-10-11 08:03:58 [41997] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005481015.storagemgmt.ooo.test@OOO.TEST Oct 11 08:03:58 np0005481015 certmonger[41997]: " for child. Oct 11 08:03:58 np0005481015 certmonger[41997]: 2025-10-11 08:03:58 [41997] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:03:58 np0005481015 certmonger[41997]: 2025-10-11 08:03:58 [41997] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:03:58 np0005481015 certmonger[41997]: MIID+DCCAuACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDE1LnN0b3JhZ2VtZ210 Oct 11 08:03:58 np0005481015 certmonger[41997]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxUJqnkPO Oct 11 08:03:58 np0005481015 certmonger[41997]: L+eNo2QR8UirgcDT1DDDb6PZS/3MRAioC5WWR3n42pRFuZBRwc396TNWd6w8hqpo Oct 11 08:03:58 np0005481015 certmonger[41997]: e4Hi9H8zmvkbM4bzIwz4L8ThREnIf3Fno0w4bcKcwm79iVJZD1O8QoHKEYxeAj06 Oct 11 08:03:58 np0005481015 certmonger[41997]: vJasnhpQGUbBnjMukrSKBT5y4FzcvlUihNlXTekjqadjfLGpvMzyWWhN4PkKEJwU Oct 11 08:03:58 np0005481015 certmonger[41997]: ZZp8g0ryBX+sdhMhOPkZ6s7ZFFAy0rmuocYaRrReqKMg3/811zR5kRbg6VB2j0Mx Oct 11 08:03:58 np0005481015 certmonger[41997]: 9vNmvnesHV4QtyXf2rtONxjgnVp9GExg9cBx1P6daeJng9DgCW4fAHm2mjIOIlgo Oct 11 08:03:58 np0005481015 certmonger[41997]: J5QahOm1IgmbVwIDAQABoIIBhTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:03:58 np0005481015 certmonger[41997]: ADEAMQAwADgAMAAzADUAODCCAVQGCSqGSIb3DQEJDjGCAUUwggFBMAsGA1UdDwQE Oct 11 08:03:58 np0005481015 certmonger[41997]: AwIFoDCB5QYDVR0RBIHdMIHagiFucDAwMDU0ODEwMTUuc3RvcmFnZW1nbXQub29v Oct 11 08:03:58 np0005481015 certmonger[41997]: LnRlc3SCHm92ZXJjbG91ZC5zdG9yYWdlbWdtdC5vb28udGVzdKBCBgorBgEEAYI3 Oct 11 08:03:58 np0005481015 certmonger[41997]: FAIDoDQMMmhhcHJveHkvbnAwMDA1NDgxMDE1LnN0b3JhZ2VtZ210Lm9vby50ZXN0 Oct 11 08:03:58 np0005481015 certmonger[41997]: QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAs Oct 11 08:03:58 np0005481015 certmonger[41997]: GwdoYXByb3h5GyFucDAwMDU0ODEwMTUuc3RvcmFnZW1nbXQub29vLnRlc3QwHQYD Oct 11 08:03:58 np0005481015 certmonger[41997]: VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O Oct 11 08:03:58 np0005481015 certmonger[41997]: BBYEFDSIPYZ4Rl4URtxZpU7RlL2VRe9OMA0GCSqGSIb3DQEBCwUAA4IBAQCEZ9qE Oct 11 08:03:58 np0005481015 certmonger[41997]: WoBk98aafLtsLBAaiIZ41FjYRtqOloNd+BwXt9GVo68hs4ea3N57CcLVPEtrryFl Oct 11 08:03:58 np0005481015 certmonger[41997]: cv0j0Ehhb4pgyhCxXtA7YQU/WIH7qLWY5NRQwePTjWheHwMfzTWZ6r4I2bM1JbN0 Oct 11 08:03:58 np0005481015 certmonger[41997]: PVQHXHASooAONmYW8J9omHAOTDEzbAJEWtxfmuRsd4u6cR9CDygs1Dmwnfk069NQ Oct 11 08:03:58 np0005481015 certmonger[41997]: UJQsZ8/gYlyRGXqYQsET95WMWUVDjBu78jyXSMupLmz3kNLC2lsKGyFoeJ2Rgr6/ Oct 11 08:03:58 np0005481015 certmonger[41997]: d+6R3zEM9cNbs/G+sBHd8J/eYxWs+vSOBZktU8V6ljMyCfiBzotT84bgJSqUW7yJ Oct 11 08:03:58 np0005481015 certmonger[41997]: c/4fkS0+k5EZP9/4 Oct 11 08:03:58 np0005481015 certmonger[41997]: -----END CERTIFICATE REQUEST----- Oct 11 08:03:58 np0005481015 certmonger[41997]: " for child. Oct 11 08:03:58 np0005481015 certmonger[41997]: 2025-10-11 08:03:58 [41997] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:03:58 np0005481015 certmonger[41997]: 2025-10-11 08:03:58 [41997] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxUJqnkPOL+eNo2QR8UirgcDT1DDDb6PZS/3MRAioC5WWR3n42pRFuZBRwc396TNWd6w8hqpoe4Hi9H8zmvkbM4bzIwz4L8ThREnIf3Fno0w4bcKcwm79iVJZD1O8QoHKEYxeAj06vJasnhpQGUbBnjMukrSKBT5y4FzcvlUihNlXTekjqadjfLGpvMzyWWhN4PkKEJwUZZp8g0ryBX+sdhMhOPkZ6s7ZFFAy0rmuocYaRrReqKMg3/811zR5kRbg6VB2j0Mx9vNmvnesHV4QtyXf2rtONxjgnVp9GExg9cBx1P6daeJng9DgCW4fAHm2mjIOIlgoJ5QahOm1IgmbVwIDAQAB" for child. Oct 11 08:03:58 np0005481015 certmonger[41997]: 2025-10-11 08:03:58 [41997] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:03:58 np0005481015 certmonger[41997]: 2025-10-11 08:03:58 [41997] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:03:58 np0005481015 certmonger[41997]: 2025-10-11 08:03:58 [41997] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:03:58 np0005481015 certmonger[41997]: 2025-10-11 08:03:58 [41997] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:03:58 np0005481015 certmonger[41997]: 2025-10-11 08:03:58 [41997] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[41997]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:03:58 np0005481015 certmonger[41997]: Certificate: "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" Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Certificate submission still ongoing. Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Certificate submission attempt complete. Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Child status = 0. Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Child output: Oct 11 08:03:58 np0005481015 certmonger[39512]: "-----BEGIN CERTIFICATE----- Oct 11 08:03:58 np0005481015 certmonger[39512]: MIIFezCCA+OgAwIBAgIBNTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:58 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:58 np0005481015 certmonger[39512]: MDM1OFoXDTI3MTAxMjA4MDM1OFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:03:58 np0005481015 certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:03:58 np0005481015 certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBAMVCap5Dzi/njaNkEfFIq4HA09Qww2+j2Uv9 Oct 11 08:03:58 np0005481015 certmonger[39512]: zEQIqAuVlkd5+NqURbmQUcHN/ekzVnesPIaqaHuB4vR/M5r5GzOG8yMM+C/E4URJ Oct 11 08:03:58 np0005481015 certmonger[39512]: yH9xZ6NMOG3CnMJu/YlSWQ9TvEKByhGMXgI9OryWrJ4aUBlGwZ4zLpK0igU+cuBc Oct 11 08:03:58 np0005481015 certmonger[39512]: 3L5VIoTZV03pI6mnY3yxqbzM8lloTeD5ChCcFGWafINK8gV/rHYTITj5GerO2RRQ Oct 11 08:03:58 np0005481015 certmonger[39512]: MtK5rqHGGka0XqijIN//Ndc0eZEW4OlQdo9DMfbzZr53rB1eELcl39q7TjcY4J1a Oct 11 08:03:58 np0005481015 certmonger[39512]: fRhMYPXAcdT+nWniZ4PQ4AluHwB5tpoyDiJYKCeUGoTptSIJm1cCAwEAAaOCAgww Oct 11 08:03:58 np0005481015 certmonger[39512]: ggIIMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:03:58 np0005481015 certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:03:58 np0005481015 certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:03:58 np0005481015 certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:03:58 np0005481015 certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:03:58 np0005481015 certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFBeaN6O+yoF3ekA3/yf/YitL Oct 11 08:03:58 np0005481015 certmonger[39512]: uix6MIHlBgNVHREEgd0wgdqCIW5wMDAwNTQ4MTAxNS5zdG9yYWdlbWdtdC5vb28u Oct 11 08:03:58 np0005481015 certmonger[39512]: dGVzdIIeb3ZlcmNsb3VkLnN0b3JhZ2VtZ210Lm9vby50ZXN0oEIGCisGAQQBgjcU Oct 11 08:03:58 np0005481015 certmonger[39512]: AgOgNAwyaGFwcm94eS9ucDAwMDU0ODEwMTUuc3RvcmFnZW1nbXQub29vLnRlc3RA Oct 11 08:03:58 np0005481015 certmonger[39512]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Oct 11 08:03:58 np0005481015 certmonger[39512]: B2hhcHJveHkbIW5wMDAwNTQ4MTAxNS5zdG9yYWdlbWdtdC5vb28udGVzdDANBgkq Oct 11 08:03:58 np0005481015 certmonger[39512]: hkiG9w0BAQsFAAOCAYEAGaWPpAohAKAq+Qje51N8ieH8cD+dQiTUAnuBvACiXBPW Oct 11 08:03:58 np0005481015 certmonger[39512]: RyI3JewSprBm++H/RDPIyv739+b+AZ+djB7FKIWIrIhyB8BOTQ1cV421LcTwEUYL Oct 11 08:03:58 np0005481015 certmonger[39512]: 8MglURYs9UAq+zWRw44k9S0BZHLvX3898IGK81t23nsre1SdJw0TPTfGWAgALKxV Oct 11 08:03:58 np0005481015 certmonger[39512]: pL6NveZDr7a4n9BwXi3Wle+yXXqc2yEHfteoCrZv9wdSg+3K4H1aq69Gu2KOKvp0 Oct 11 08:03:58 np0005481015 certmonger[39512]: 65tuIwqmX+GRcdBIf+yD8H3dWovToKxSl50lVEJVO1qRlqGqaX3jSz8EfRSLOWBc Oct 11 08:03:58 np0005481015 certmonger[39512]: HQx19K9z/7y5iDjZXgIg5JP9daofyPzHdyzFy1mdDGFUaqcCIrlPtyR6XrqKTdRn Oct 11 08:03:58 np0005481015 certmonger[39512]: NwpEojR3TTWwEGmbI48CbHGdHVwMwhU8ByTv8sM3145HdM+Y2hJV2dMpv1bovXCA Oct 11 08:03:58 np0005481015 certmonger[39512]: bLvQ4h8LdiDmZ31XWzQZ7lf15xmMl8NntEAV781otMuQeNXIXGfR4QXb0pmfKXZ/ Oct 11 08:03:58 np0005481015 certmonger[39512]: /kFC/S5ilWu1su5o5alT Oct 11 08:03:58 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:03:58 np0005481015 certmonger[39512]: " Oct 11 08:03:58 np0005481015 certmonger[41999]: 2025-10-11 08:03:58 [41999] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:03:58 np0005481015 certmonger[41999]: MIIFezCCA+OgAwIBAgIBNTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:58 np0005481015 certmonger[41999]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:58 np0005481015 certmonger[41999]: MDM1OFoXDTI3MTAxMjA4MDM1OFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:03:58 np0005481015 certmonger[41999]: BAMMIW5wMDAwNTQ4MTAxNS5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:03:58 np0005481015 certmonger[41999]: hvcNAQEBBQADggEPADCCAQoCggEBAMVCap5Dzi/njaNkEfFIq4HA09Qww2+j2Uv9 Oct 11 08:03:58 np0005481015 certmonger[41999]: zEQIqAuVlkd5+NqURbmQUcHN/ekzVnesPIaqaHuB4vR/M5r5GzOG8yMM+C/E4URJ Oct 11 08:03:58 np0005481015 certmonger[41999]: yH9xZ6NMOG3CnMJu/YlSWQ9TvEKByhGMXgI9OryWrJ4aUBlGwZ4zLpK0igU+cuBc Oct 11 08:03:58 np0005481015 certmonger[41999]: 3L5VIoTZV03pI6mnY3yxqbzM8lloTeD5ChCcFGWafINK8gV/rHYTITj5GerO2RRQ Oct 11 08:03:58 np0005481015 certmonger[41999]: MtK5rqHGGka0XqijIN//Ndc0eZEW4OlQdo9DMfbzZr53rB1eELcl39q7TjcY4J1a Oct 11 08:03:58 np0005481015 certmonger[41999]: fRhMYPXAcdT+nWniZ4PQ4AluHwB5tpoyDiJYKCeUGoTptSIJm1cCAwEAAaOCAgww Oct 11 08:03:58 np0005481015 certmonger[41999]: ggIIMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:03:58 np0005481015 certmonger[41999]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:03:58 np0005481015 certmonger[41999]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:03:58 np0005481015 certmonger[41999]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:03:58 np0005481015 certmonger[41999]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:03:58 np0005481015 certmonger[41999]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFBeaN6O+yoF3ekA3/yf/YitL Oct 11 08:03:58 np0005481015 certmonger[41999]: uix6MIHlBgNVHREEgd0wgdqCIW5wMDAwNTQ4MTAxNS5zdG9yYWdlbWdtdC5vb28u Oct 11 08:03:58 np0005481015 certmonger[41999]: dGVzdIIeb3ZlcmNsb3VkLnN0b3JhZ2VtZ210Lm9vby50ZXN0oEIGCisGAQQBgjcU Oct 11 08:03:58 np0005481015 certmonger[41999]: AgOgNAwyaGFwcm94eS9ucDAwMDU0ODEwMTUuc3RvcmFnZW1nbXQub29vLnRlc3RA Oct 11 08:03:58 np0005481015 certmonger[41999]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Oct 11 08:03:58 np0005481015 certmonger[41999]: B2hhcHJveHkbIW5wMDAwNTQ4MTAxNS5zdG9yYWdlbWdtdC5vb28udGVzdDANBgkq Oct 11 08:03:58 np0005481015 certmonger[41999]: hkiG9w0BAQsFAAOCAYEAGaWPpAohAKAq+Qje51N8ieH8cD+dQiTUAnuBvACiXBPW Oct 11 08:03:58 np0005481015 certmonger[41999]: RyI3JewSprBm++H/RDPIyv739+b+AZ+djB7FKIWIrIhyB8BOTQ1cV421LcTwEUYL Oct 11 08:03:58 np0005481015 certmonger[41999]: 8MglURYs9UAq+zWRw44k9S0BZHLvX3898IGK81t23nsre1SdJw0TPTfGWAgALKxV Oct 11 08:03:58 np0005481015 certmonger[41999]: pL6NveZDr7a4n9BwXi3Wle+yXXqc2yEHfteoCrZv9wdSg+3K4H1aq69Gu2KOKvp0 Oct 11 08:03:58 np0005481015 certmonger[41999]: 65tuIwqmX+GRcdBIf+yD8H3dWovToKxSl50lVEJVO1qRlqGqaX3jSz8EfRSLOWBc Oct 11 08:03:58 np0005481015 certmonger[41999]: HQx19K9z/7y5iDjZXgIg5JP9daofyPzHdyzFy1mdDGFUaqcCIrlPtyR6XrqKTdRn Oct 11 08:03:58 np0005481015 certmonger[41999]: NwpEojR3TTWwEGmbI48CbHGdHVwMwhU8ByTv8sM3145HdM+Y2hJV2dMpv1bovXCA Oct 11 08:03:58 np0005481015 certmonger[41999]: bLvQ4h8LdiDmZ31XWzQZ7lf15xmMl8NntEAV781otMuQeNXIXGfR4QXb0pmfKXZ/ Oct 11 08:03:58 np0005481015 certmonger[41999]: /kFC/S5ilWu1su5o5alT Oct 11 08:03:58 np0005481015 certmonger[41999]: -----END CERTIFICATE----- Oct 11 08:03:58 np0005481015 certmonger[41999]: ". Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Certificate submission still ongoing. Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Certificate submission postprocessing complete. Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Child status = 0. Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Child output: Oct 11 08:03:58 np0005481015 certmonger[39512]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n/kFC/S5ilWu1su5o5alT\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:03:58 np0005481015 certmonger[39512]: " Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:03:58 np0005481015 certmonger[39512]: MIIFezCCA+OgAwIBAgIBNTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:03:58 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:03:58 np0005481015 certmonger[39512]: MDM1OFoXDTI3MTAxMjA4MDM1OFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:03:58 np0005481015 certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:03:58 np0005481015 certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBAMVCap5Dzi/njaNkEfFIq4HA09Qww2+j2Uv9 Oct 11 08:03:58 np0005481015 certmonger[39512]: zEQIqAuVlkd5+NqURbmQUcHN/ekzVnesPIaqaHuB4vR/M5r5GzOG8yMM+C/E4URJ Oct 11 08:03:58 np0005481015 certmonger[39512]: yH9xZ6NMOG3CnMJu/YlSWQ9TvEKByhGMXgI9OryWrJ4aUBlGwZ4zLpK0igU+cuBc Oct 11 08:03:58 np0005481015 certmonger[39512]: 3L5VIoTZV03pI6mnY3yxqbzM8lloTeD5ChCcFGWafINK8gV/rHYTITj5GerO2RRQ Oct 11 08:03:58 np0005481015 certmonger[39512]: MtK5rqHGGka0XqijIN//Ndc0eZEW4OlQdo9DMfbzZr53rB1eELcl39q7TjcY4J1a Oct 11 08:03:58 np0005481015 certmonger[39512]: fRhMYPXAcdT+nWniZ4PQ4AluHwB5tpoyDiJYKCeUGoTptSIJm1cCAwEAAaOCAgww Oct 11 08:03:58 np0005481015 certmonger[39512]: ggIIMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:03:58 np0005481015 certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:03:58 np0005481015 certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:03:58 np0005481015 certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:03:58 np0005481015 certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:03:58 np0005481015 certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFBeaN6O+yoF3ekA3/yf/YitL Oct 11 08:03:58 np0005481015 certmonger[39512]: uix6MIHlBgNVHREEgd0wgdqCIW5wMDAwNTQ4MTAxNS5zdG9yYWdlbWdtdC5vb28u Oct 11 08:03:58 np0005481015 certmonger[39512]: dGVzdIIeb3ZlcmNsb3VkLnN0b3JhZ2VtZ210Lm9vby50ZXN0oEIGCisGAQQBgjcU Oct 11 08:03:58 np0005481015 certmonger[39512]: AgOgNAwyaGFwcm94eS9ucDAwMDU0ODEwMTUuc3RvcmFnZW1nbXQub29vLnRlc3RA Oct 11 08:03:58 np0005481015 certmonger[39512]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Oct 11 08:03:58 np0005481015 certmonger[39512]: B2hhcHJveHkbIW5wMDAwNTQ4MTAxNS5zdG9yYWdlbWdtdC5vb28udGVzdDANBgkq Oct 11 08:03:58 np0005481015 certmonger[39512]: hkiG9w0BAQsFAAOCAYEAGaWPpAohAKAq+Qje51N8ieH8cD+dQiTUAnuBvACiXBPW Oct 11 08:03:58 np0005481015 certmonger[39512]: RyI3JewSprBm++H/RDPIyv739+b+AZ+djB7FKIWIrIhyB8BOTQ1cV421LcTwEUYL Oct 11 08:03:58 np0005481015 certmonger[39512]: 8MglURYs9UAq+zWRw44k9S0BZHLvX3898IGK81t23nsre1SdJw0TPTfGWAgALKxV Oct 11 08:03:58 np0005481015 certmonger[39512]: pL6NveZDr7a4n9BwXi3Wle+yXXqc2yEHfteoCrZv9wdSg+3K4H1aq69Gu2KOKvp0 Oct 11 08:03:58 np0005481015 certmonger[39512]: 65tuIwqmX+GRcdBIf+yD8H3dWovToKxSl50lVEJVO1qRlqGqaX3jSz8EfRSLOWBc Oct 11 08:03:58 np0005481015 certmonger[39512]: HQx19K9z/7y5iDjZXgIg5JP9daofyPzHdyzFy1mdDGFUaqcCIrlPtyR6XrqKTdRn Oct 11 08:03:58 np0005481015 certmonger[39512]: NwpEojR3TTWwEGmbI48CbHGdHVwMwhU8ByTv8sM3145HdM+Y2hJV2dMpv1bovXCA Oct 11 08:03:58 np0005481015 certmonger[39512]: bLvQ4h8LdiDmZ31XWzQZ7lf15xmMl8NntEAV781otMuQeNXIXGfR4QXb0pmfKXZ/ Oct 11 08:03:58 np0005481015 certmonger[39512]: /kFC/S5ilWu1su5o5alT Oct 11 08:03:58 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:03:58 np0005481015 certmonger[39512]: ". Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] No hooks set for pre-save command. Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 certmonger[39512]: 2025-10-11 08:03:58 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:58 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:59 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:03:59 np0005481015 certmonger[39512]: 2025-10-11 08:03:59 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:59 np0005481015 certmonger[39512]: 2025-10-11 08:03:59 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:59 np0005481015 certmonger[42069]: Certificate in file "/etc/pki/tls/certs/haproxy-storage_mgmt-cert.crt" issued by CA and saved. Oct 11 08:03:59 np0005481015 certmonger[39512]: 2025-10-11 08:03:59 [39512] Wrote to /var/lib/certmonger/requests/20251011080358 Oct 11 08:03:59 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:00 np0005481015 python3[42085]: ansible-certificate_request Invoked with name=haproxy-internal_api-cert dns=['np0005481015.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['haproxy/np0005481015.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-internal_api-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.crt"#012cp "/etc/pki/tls/private/haproxy-internal_api-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-internal_api.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-internal_api.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[42095]: 2025-10-11 08:04:00 [42095] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481015.internalapi.ooo.test" for child. Oct 11 08:04:00 np0005481015 certmonger[42095]: 2025-10-11 08:04:00 [42095] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481015.internalapi.ooo.test Oct 11 08:04:00 np0005481015 certmonger[42095]: overcloud.internalapi.ooo.test Oct 11 08:04:00 np0005481015 certmonger[42095]: " for child. Oct 11 08:04:00 np0005481015 certmonger[42095]: 2025-10-11 08:04:00 [42095] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005481015.internalapi.ooo.test@OOO.TEST Oct 11 08:04:00 np0005481015 certmonger[42095]: " for child. Oct 11 08:04:00 np0005481015 certmonger[42095]: 2025-10-11 08:04:00 [42095] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:04:00 np0005481015 certmonger[42095]: 2025-10-11 08:04:00 [42095] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:04:00 np0005481015 certmonger[42095]: MIID+DCCAuACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDE1LmludGVybmFsYXBp Oct 11 08:04:00 np0005481015 certmonger[42095]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAt6p2nWL0 Oct 11 08:04:00 np0005481015 certmonger[42095]: WmTZs6ScDrsG0naEvwk2/+07OSKGV4eGEJsnDXSzv2lWErB6dSwi9w0sda2bDOjt Oct 11 08:04:00 np0005481015 certmonger[42095]: /GFHJtD0aVCiXN1xXlvyUnIoRh35EGKnY1ALHOrpuNuKxzTCMCbF1+deVMOW5UXH Oct 11 08:04:00 np0005481015 certmonger[42095]: 1rhUHwt27GExyqOLF8ogIaY4RStVFYxARymGiAnbbzI6/TSL0X0FcmN8iSzWcvSc Oct 11 08:04:00 np0005481015 certmonger[42095]: MVrUM2ynKLCZDTl7Ypgrgz7TOnOv0WrEQbQKcRgdYbrSRT8F6M8q6udxeDsHh8/l Oct 11 08:04:00 np0005481015 certmonger[42095]: 9rTZ1+9Htq/ETqt2ZYBfcutXkj4CHoHVRvT2NSLV4PdeKXB/mn4x6HEONfTS1jla Oct 11 08:04:00 np0005481015 certmonger[42095]: 4RFWPuyQvhyFrwIDAQABoIIBhTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:04:00 np0005481015 certmonger[42095]: ADEAMQAwADgAMAA0ADAAMDCCAVQGCSqGSIb3DQEJDjGCAUUwggFBMAsGA1UdDwQE Oct 11 08:04:00 np0005481015 certmonger[42095]: AwIFoDCB5QYDVR0RBIHdMIHagiFucDAwMDU0ODEwMTUuaW50ZXJuYWxhcGkub29v Oct 11 08:04:00 np0005481015 certmonger[42095]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBCBgorBgEEAYI3 Oct 11 08:04:00 np0005481015 certmonger[42095]: FAIDoDQMMmhhcHJveHkvbnAwMDA1NDgxMDE1LmludGVybmFsYXBpLm9vby50ZXN0 Oct 11 08:04:00 np0005481015 certmonger[42095]: QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAs Oct 11 08:04:00 np0005481015 certmonger[42095]: GwdoYXByb3h5GyFucDAwMDU0ODEwMTUuaW50ZXJuYWxhcGkub29vLnRlc3QwHQYD Oct 11 08:04:00 np0005481015 certmonger[42095]: VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O Oct 11 08:04:00 np0005481015 certmonger[42095]: BBYEFDSIPYZ4Rl4URtxZpU7RlL2VRe9OMA0GCSqGSIb3DQEBCwUAA4IBAQBLd6Uw Oct 11 08:04:00 np0005481015 certmonger[42095]: skmhMFBkRlDuOYwMLgMSNPAIegVdPK0V4Tq7r/+v1hrdrnDdwTopZ3r+ULYQU9/a Oct 11 08:04:00 np0005481015 certmonger[42095]: e/13ZlCpcT/9iKj65h3DtrVfwm1jKxOcgYZC1E8/t/VHKuPq7kptCgSkL/qpoVV3 Oct 11 08:04:00 np0005481015 certmonger[42095]: MV+6xFbXfq4ZbBbItzSZvLTRZNXLeyV8mynEAnPECSC3xIpQmKF+SXfWP+bUMH/x Oct 11 08:04:00 np0005481015 certmonger[42095]: zfdfoPsgk5MPe6kss2dq2cFv8QjwqA/ph/4YLd0HzQwmVlmCFfm/mKQa58yxjOmx Oct 11 08:04:00 np0005481015 certmonger[42095]: N3UozLuM6rcam06y725/6RRya8C6KZgeAYOv4KnAQuMD5hrKa2MFsgezxUCzO3RW Oct 11 08:04:00 np0005481015 certmonger[42095]: jLuFH5hNjfLwVVHb Oct 11 08:04:00 np0005481015 certmonger[42095]: -----END CERTIFICATE REQUEST----- Oct 11 08:04:00 np0005481015 certmonger[42095]: " for child. Oct 11 08:04:00 np0005481015 certmonger[42095]: 2025-10-11 08:04:00 [42095] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:04:00 np0005481015 certmonger[42095]: 2025-10-11 08:04:00 [42095] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAt6p2nWL0WmTZs6ScDrsG0naEvwk2/+07OSKGV4eGEJsnDXSzv2lWErB6dSwi9w0sda2bDOjt/GFHJtD0aVCiXN1xXlvyUnIoRh35EGKnY1ALHOrpuNuKxzTCMCbF1+deVMOW5UXH1rhUHwt27GExyqOLF8ogIaY4RStVFYxARymGiAnbbzI6/TSL0X0FcmN8iSzWcvScMVrUM2ynKLCZDTl7Ypgrgz7TOnOv0WrEQbQKcRgdYbrSRT8F6M8q6udxeDsHh8/l9rTZ1+9Htq/ETqt2ZYBfcutXkj4CHoHVRvT2NSLV4PdeKXB/mn4x6HEONfTS1jla4RFWPuyQvhyFrwIDAQAB" for child. Oct 11 08:04:00 np0005481015 certmonger[42095]: 2025-10-11 08:04:00 [42095] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:04:00 np0005481015 certmonger[42095]: 2025-10-11 08:04:00 [42095] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:04:00 np0005481015 certmonger[42095]: 2025-10-11 08:04:00 [42095] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:04:00 np0005481015 certmonger[42095]: 2025-10-11 08:04:00 [42095] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:04:00 np0005481015 certmonger[42095]: 2025-10-11 08:04:00 [42095] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[42095]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:04:00 np0005481015 certmonger[42095]: Certificate: "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" Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Certificate submission still ongoing. Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Certificate submission attempt complete. Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Child status = 0. Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Child output: Oct 11 08:04:00 np0005481015 certmonger[39512]: "-----BEGIN CERTIFICATE----- Oct 11 08:04:00 np0005481015 certmonger[39512]: MIIFezCCA+OgAwIBAgIBNzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:00 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:00 np0005481015 certmonger[39512]: MDQwMFoXDTI3MTAxMjA4MDQwMFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:00 np0005481015 certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:00 np0005481015 certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBALeqdp1i9Fpk2bOknA67BtJ2hL8JNv/tOzki Oct 11 08:04:00 np0005481015 certmonger[39512]: hleHhhCbJw10s79pVhKwenUsIvcNLHWtmwzo7fxhRybQ9GlQolzdcV5b8lJyKEYd Oct 11 08:04:00 np0005481015 certmonger[39512]: +RBip2NQCxzq6bjbisc0wjAmxdfnXlTDluVFx9a4VB8LduxhMcqjixfKICGmOEUr Oct 11 08:04:00 np0005481015 certmonger[39512]: VRWMQEcphogJ228yOv00i9F9BXJjfIks1nL0nDFa1DNspyiwmQ05e2KYK4M+0zpz Oct 11 08:04:00 np0005481015 certmonger[39512]: r9FqxEG0CnEYHWG60kU/BejPKurncXg7B4fP5fa02dfvR7avxE6rdmWAX3LrV5I+ Oct 11 08:04:00 np0005481015 certmonger[39512]: Ah6B1Ub09jUi1eD3Xilwf5p+MehxDjX00tY5WuERVj7skL4cha8CAwEAAaOCAgww Oct 11 08:04:00 np0005481015 certmonger[39512]: ggIIMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:00 np0005481015 certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:00 np0005481015 certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:00 np0005481015 certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:00 np0005481015 certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:00 np0005481015 certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFKi+qrt67u855aJC501OFJCf Oct 11 08:04:00 np0005481015 certmonger[39512]: EXjOMIHlBgNVHREEgd0wgdqCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:00 np0005481015 certmonger[39512]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEIGCisGAQQBgjcU Oct 11 08:04:00 np0005481015 certmonger[39512]: AgOgNAwyaGFwcm94eS9ucDAwMDU0ODEwMTUuaW50ZXJuYWxhcGkub29vLnRlc3RA Oct 11 08:04:00 np0005481015 certmonger[39512]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Oct 11 08:04:00 np0005481015 certmonger[39512]: B2hhcHJveHkbIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkq Oct 11 08:04:00 np0005481015 certmonger[39512]: hkiG9w0BAQsFAAOCAYEAb1f15KeUkU40rqYYK6BBZ5hJLYQnzuQsXaRU/GKqZE3l Oct 11 08:04:00 np0005481015 certmonger[39512]: qKkDXr6Dk95Q0/VRjs+9N+AOEq87pblCKiZ88W+CG5civVZIsTWF7EFe2AKDonXc Oct 11 08:04:00 np0005481015 certmonger[39512]: InuSWYOPL/yIm2osJDuWXwIMLQ4gxMWVmQ0vs953Ydm6d9TjzrshZrlrRr0qtHHF Oct 11 08:04:00 np0005481015 certmonger[39512]: RIDp7BjxA9C6l4DiXEB0g6uJGzAqZoPPBi4qoA7s8iNbkhXVXPqDN5Dx31AAn4Om Oct 11 08:04:00 np0005481015 certmonger[39512]: zCJtNuwADIz5gOpnzYx3rLupI7chl64H2bRYAoN41pIVR6h0j/UMG59I9IbwkBgq Oct 11 08:04:00 np0005481015 certmonger[39512]: mpa5pelBIotaqnRKE6/wGY+lDVRoj9gXl7paG/XI+/W4DjZaKvCyty6klebMspjW Oct 11 08:04:00 np0005481015 certmonger[39512]: SD/5EBKj3bgiw7hbuCgv8x9JHXeLsYgKBtWw6W6Q8n7rOvT+vUwzi/+Mq3Kj/mXE Oct 11 08:04:00 np0005481015 certmonger[39512]: tkFW3Te42b0t7foVft6W1ugC8d/OKK/tMDIVVqLHtvsC6c0rnpCKH2b/9oULTLXA Oct 11 08:04:00 np0005481015 certmonger[39512]: QAybr+P9tK87H94gyM8h Oct 11 08:04:00 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:04:00 np0005481015 certmonger[39512]: " Oct 11 08:04:00 np0005481015 certmonger[42097]: 2025-10-11 08:04:00 [42097] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:04:00 np0005481015 certmonger[42097]: MIIFezCCA+OgAwIBAgIBNzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:00 np0005481015 certmonger[42097]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:00 np0005481015 certmonger[42097]: MDQwMFoXDTI3MTAxMjA4MDQwMFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:00 np0005481015 certmonger[42097]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:00 np0005481015 certmonger[42097]: hvcNAQEBBQADggEPADCCAQoCggEBALeqdp1i9Fpk2bOknA67BtJ2hL8JNv/tOzki Oct 11 08:04:00 np0005481015 certmonger[42097]: hleHhhCbJw10s79pVhKwenUsIvcNLHWtmwzo7fxhRybQ9GlQolzdcV5b8lJyKEYd Oct 11 08:04:00 np0005481015 certmonger[42097]: +RBip2NQCxzq6bjbisc0wjAmxdfnXlTDluVFx9a4VB8LduxhMcqjixfKICGmOEUr Oct 11 08:04:00 np0005481015 certmonger[42097]: VRWMQEcphogJ228yOv00i9F9BXJjfIks1nL0nDFa1DNspyiwmQ05e2KYK4M+0zpz Oct 11 08:04:00 np0005481015 certmonger[42097]: r9FqxEG0CnEYHWG60kU/BejPKurncXg7B4fP5fa02dfvR7avxE6rdmWAX3LrV5I+ Oct 11 08:04:00 np0005481015 certmonger[42097]: Ah6B1Ub09jUi1eD3Xilwf5p+MehxDjX00tY5WuERVj7skL4cha8CAwEAAaOCAgww Oct 11 08:04:00 np0005481015 certmonger[42097]: ggIIMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:00 np0005481015 certmonger[42097]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:00 np0005481015 certmonger[42097]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:00 np0005481015 certmonger[42097]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:00 np0005481015 certmonger[42097]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:00 np0005481015 certmonger[42097]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFKi+qrt67u855aJC501OFJCf Oct 11 08:04:00 np0005481015 certmonger[42097]: EXjOMIHlBgNVHREEgd0wgdqCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:00 np0005481015 certmonger[42097]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEIGCisGAQQBgjcU Oct 11 08:04:00 np0005481015 certmonger[42097]: AgOgNAwyaGFwcm94eS9ucDAwMDU0ODEwMTUuaW50ZXJuYWxhcGkub29vLnRlc3RA Oct 11 08:04:00 np0005481015 certmonger[42097]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Oct 11 08:04:00 np0005481015 certmonger[42097]: B2hhcHJveHkbIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkq Oct 11 08:04:00 np0005481015 certmonger[42097]: hkiG9w0BAQsFAAOCAYEAb1f15KeUkU40rqYYK6BBZ5hJLYQnzuQsXaRU/GKqZE3l Oct 11 08:04:00 np0005481015 certmonger[42097]: qKkDXr6Dk95Q0/VRjs+9N+AOEq87pblCKiZ88W+CG5civVZIsTWF7EFe2AKDonXc Oct 11 08:04:00 np0005481015 certmonger[42097]: InuSWYOPL/yIm2osJDuWXwIMLQ4gxMWVmQ0vs953Ydm6d9TjzrshZrlrRr0qtHHF Oct 11 08:04:00 np0005481015 certmonger[42097]: RIDp7BjxA9C6l4DiXEB0g6uJGzAqZoPPBi4qoA7s8iNbkhXVXPqDN5Dx31AAn4Om Oct 11 08:04:00 np0005481015 certmonger[42097]: zCJtNuwADIz5gOpnzYx3rLupI7chl64H2bRYAoN41pIVR6h0j/UMG59I9IbwkBgq Oct 11 08:04:00 np0005481015 certmonger[42097]: mpa5pelBIotaqnRKE6/wGY+lDVRoj9gXl7paG/XI+/W4DjZaKvCyty6klebMspjW Oct 11 08:04:00 np0005481015 certmonger[42097]: SD/5EBKj3bgiw7hbuCgv8x9JHXeLsYgKBtWw6W6Q8n7rOvT+vUwzi/+Mq3Kj/mXE Oct 11 08:04:00 np0005481015 certmonger[42097]: tkFW3Te42b0t7foVft6W1ugC8d/OKK/tMDIVVqLHtvsC6c0rnpCKH2b/9oULTLXA Oct 11 08:04:00 np0005481015 certmonger[42097]: QAybr+P9tK87H94gyM8h Oct 11 08:04:00 np0005481015 certmonger[42097]: -----END CERTIFICATE----- Oct 11 08:04:00 np0005481015 certmonger[42097]: ". Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Certificate submission still ongoing. Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Certificate submission postprocessing complete. Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Child status = 0. Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Child output: Oct 11 08:04:00 np0005481015 certmonger[39512]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nQAybr+P9tK87H94gyM8h\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:04:00 np0005481015 certmonger[39512]: " Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:04:00 np0005481015 certmonger[39512]: MIIFezCCA+OgAwIBAgIBNzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:00 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:00 np0005481015 certmonger[39512]: MDQwMFoXDTI3MTAxMjA4MDQwMFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:00 np0005481015 certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:00 np0005481015 certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBALeqdp1i9Fpk2bOknA67BtJ2hL8JNv/tOzki Oct 11 08:04:00 np0005481015 certmonger[39512]: hleHhhCbJw10s79pVhKwenUsIvcNLHWtmwzo7fxhRybQ9GlQolzdcV5b8lJyKEYd Oct 11 08:04:00 np0005481015 certmonger[39512]: +RBip2NQCxzq6bjbisc0wjAmxdfnXlTDluVFx9a4VB8LduxhMcqjixfKICGmOEUr Oct 11 08:04:00 np0005481015 certmonger[39512]: VRWMQEcphogJ228yOv00i9F9BXJjfIks1nL0nDFa1DNspyiwmQ05e2KYK4M+0zpz Oct 11 08:04:00 np0005481015 certmonger[39512]: r9FqxEG0CnEYHWG60kU/BejPKurncXg7B4fP5fa02dfvR7avxE6rdmWAX3LrV5I+ Oct 11 08:04:00 np0005481015 certmonger[39512]: Ah6B1Ub09jUi1eD3Xilwf5p+MehxDjX00tY5WuERVj7skL4cha8CAwEAAaOCAgww Oct 11 08:04:00 np0005481015 certmonger[39512]: ggIIMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:00 np0005481015 certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:00 np0005481015 certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:00 np0005481015 certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:00 np0005481015 certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:00 np0005481015 certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFKi+qrt67u855aJC501OFJCf Oct 11 08:04:00 np0005481015 certmonger[39512]: EXjOMIHlBgNVHREEgd0wgdqCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:00 np0005481015 certmonger[39512]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEIGCisGAQQBgjcU Oct 11 08:04:00 np0005481015 certmonger[39512]: AgOgNAwyaGFwcm94eS9ucDAwMDU0ODEwMTUuaW50ZXJuYWxhcGkub29vLnRlc3RA Oct 11 08:04:00 np0005481015 certmonger[39512]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Oct 11 08:04:00 np0005481015 certmonger[39512]: B2hhcHJveHkbIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkq Oct 11 08:04:00 np0005481015 certmonger[39512]: hkiG9w0BAQsFAAOCAYEAb1f15KeUkU40rqYYK6BBZ5hJLYQnzuQsXaRU/GKqZE3l Oct 11 08:04:00 np0005481015 certmonger[39512]: qKkDXr6Dk95Q0/VRjs+9N+AOEq87pblCKiZ88W+CG5civVZIsTWF7EFe2AKDonXc Oct 11 08:04:00 np0005481015 certmonger[39512]: InuSWYOPL/yIm2osJDuWXwIMLQ4gxMWVmQ0vs953Ydm6d9TjzrshZrlrRr0qtHHF Oct 11 08:04:00 np0005481015 certmonger[39512]: RIDp7BjxA9C6l4DiXEB0g6uJGzAqZoPPBi4qoA7s8iNbkhXVXPqDN5Dx31AAn4Om Oct 11 08:04:00 np0005481015 certmonger[39512]: zCJtNuwADIz5gOpnzYx3rLupI7chl64H2bRYAoN41pIVR6h0j/UMG59I9IbwkBgq Oct 11 08:04:00 np0005481015 certmonger[39512]: mpa5pelBIotaqnRKE6/wGY+lDVRoj9gXl7paG/XI+/W4DjZaKvCyty6klebMspjW Oct 11 08:04:00 np0005481015 certmonger[39512]: SD/5EBKj3bgiw7hbuCgv8x9JHXeLsYgKBtWw6W6Q8n7rOvT+vUwzi/+Mq3Kj/mXE Oct 11 08:04:00 np0005481015 certmonger[39512]: tkFW3Te42b0t7foVft6W1ugC8d/OKK/tMDIVVqLHtvsC6c0rnpCKH2b/9oULTLXA Oct 11 08:04:00 np0005481015 certmonger[39512]: QAybr+P9tK87H94gyM8h Oct 11 08:04:00 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:04:00 np0005481015 certmonger[39512]: ". Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] No hooks set for pre-save command. Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:00 np0005481015 certmonger[39512]: 2025-10-11 08:04:00 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:01 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:01 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:01 np0005481015 certmonger[39512]: 2025-10-11 08:04:01 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:01 np0005481015 certmonger[39512]: 2025-10-11 08:04:01 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:01 np0005481015 certmonger[42168]: Certificate in file "/etc/pki/tls/certs/haproxy-internal_api-cert.crt" issued by CA and saved. Oct 11 08:04:01 np0005481015 certmonger[39512]: 2025-10-11 08:04:01 [39512] Wrote to /var/lib/certmonger/requests/20251011080400 Oct 11 08:04:01 np0005481015 python3[42184]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q lvm2 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:04:02 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:03 np0005481015 python3[42201]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:04:11 np0005481015 podman[42202]: 2025-10-11 08:04:03.152385959 +0000 UTC m=+0.031034505 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 Oct 11 08:04:11 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:11 np0005481015 python3[42325]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 cluster.common.tag/manila-share:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:04:12 np0005481015 podman[42326]: 2025-10-11 08:04:12.022005007 +0000 UTC m=+0.047263522 image tag 5b8751731d4e88def30b35fe920ea8b7144eb85593c68b79fefc7a35d737b9c5 cluster.common.tag/manila-share:pcmklatest Oct 11 08:04:12 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:12 np0005481015 python3[42353]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:04:13 np0005481015 python3[42373]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:04:16 np0005481015 python3[42390]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:04:19 np0005481015 python3[42407]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:04:19 np0005481015 python3[42423]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:04:20 np0005481015 python3[42439]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:04:22 np0005481015 python3[42457]: ansible-certificate_request Invoked with name=memcached dns=['np0005481015.internalapi.ooo.test'] principal=['memcached/np0005481015.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep memcached)#012service_crt="/etc/pki/tls/certs/memcached.crt"#012service_key="/etc/pki/tls/private/memcached.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec -u root "$container_name" chown memcached:memcached "$service_crt"#012podman exec -u root "$container_name" chown memcached:memcached "$service_key"#012# Send refresh_certs command to memcached to read the new certificate#012memcached_ip="$(hiera -c /etc/puppet/hiera.yaml memcached::listen_ip.0 127.0.0.1)"#012memcached_port="$(hiera -c /etc/puppet/hiera.yaml memcached::tcp_port 11211)"#012echo refresh_certs | openssl s_client -connect $memcached_ip:$memcached_port#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:04:22 np0005481015 certmonger[39512]: 2025-10-11 08:04:22 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:22 np0005481015 certmonger[39512]: 2025-10-11 08:04:22 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:22 np0005481015 certmonger[39512]: 2025-10-11 08:04:22 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:22 np0005481015 certmonger[39512]: 2025-10-11 08:04:22 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:22 np0005481015 certmonger[39512]: 2025-10-11 08:04:22 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:22 np0005481015 certmonger[39512]: 2025-10-11 08:04:22 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:22 np0005481015 certmonger[39512]: 2025-10-11 08:04:22 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:22 np0005481015 certmonger[39512]: 2025-10-11 08:04:22 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:22 np0005481015 certmonger[39512]: 2025-10-11 08:04:22 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:22 np0005481015 certmonger[39512]: 2025-10-11 08:04:22 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:22 np0005481015 certmonger[39512]: 2025-10-11 08:04:22 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:22 np0005481015 certmonger[39512]: 2025-10-11 08:04:22 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:22 np0005481015 certmonger[39512]: 2025-10-11 08:04:22 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:22 np0005481015 certmonger[39512]: 2025-10-11 08:04:22 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:22 np0005481015 certmonger[39512]: 2025-10-11 08:04:22 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:22 np0005481015 certmonger[39512]: 2025-10-11 08:04:22 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:22 np0005481015 certmonger[39512]: 2025-10-11 08:04:22 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:22 np0005481015 certmonger[42467]: 2025-10-11 08:04:22 [42467] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481015.internalapi.ooo.test" for child. Oct 11 08:04:22 np0005481015 certmonger[42467]: 2025-10-11 08:04:22 [42467] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481015.internalapi.ooo.test Oct 11 08:04:22 np0005481015 certmonger[42467]: " for child. Oct 11 08:04:22 np0005481015 certmonger[42467]: 2025-10-11 08:04:22 [42467] Setting "CERTMONGER_REQ_PRINCIPAL" to "memcached/np0005481015.internalapi.ooo.test@OOO.TEST Oct 11 08:04:22 np0005481015 certmonger[42467]: " for child. Oct 11 08:04:22 np0005481015 certmonger[42467]: 2025-10-11 08:04:22 [42467] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:04:22 np0005481015 certmonger[42467]: 2025-10-11 08:04:22 [42467] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:04:22 np0005481015 certmonger[42467]: MIID3DCCAsQCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDE1LmludGVybmFsYXBp Oct 11 08:04:22 np0005481015 certmonger[42467]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvy2AXiNo Oct 11 08:04:22 np0005481015 certmonger[42467]: 9p5uT7PB7BU5DWGnAOTZxAEbtUZsyrjtfPBfv8806EmoC9FNszwtKazhC2G4nmW6 Oct 11 08:04:22 np0005481015 certmonger[42467]: ScNkF+x6FpOqwCU4kSH4Nal2Xq/NE0nxAJS2tfBa9+ywu4xQL9PdCWfvcXs8zRng Oct 11 08:04:22 np0005481015 certmonger[42467]: ojLlTE5ZOw9mgjkXXu9TdZ4HZkGoMnrAubedAL5HBBqOrFExQWxc5MW51zfyQE6Z Oct 11 08:04:22 np0005481015 certmonger[42467]: 9CPAxKBKf+ljXToUI8igIloiTb0TtNF7AyeI8Q4rk02j/9tCqYRMPQr/NosZryad Oct 11 08:04:22 np0005481015 certmonger[42467]: mt3+rmRiJmQo2z8Uf9rWeStTUTkbzr/YWi0QYfCsnRVRkLicMTTvB8NS1wuUCENv Oct 11 08:04:22 np0005481015 certmonger[42467]: wPj/wkgYeeDhvwIDAQABoIIBaTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:04:22 np0005481015 certmonger[42467]: ADEAMQAwADgAMAA0ADIAMjCCATgGCSqGSIb3DQEJDjGCASkwggElMAsGA1UdDwQE Oct 11 08:04:22 np0005481015 certmonger[42467]: AwIFoDCByQYDVR0RBIHBMIG+giFucDAwMDU0ODEwMTUuaW50ZXJuYWxhcGkub29v Oct 11 08:04:22 np0005481015 certmonger[42467]: LnRlc3SgRAYKKwYBBAGCNxQCA6A2DDRtZW1jYWNoZWQvbnAwMDA1NDgxMDE1Lmlu Oct 11 08:04:22 np0005481015 certmonger[42467]: dGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFMGBisGAQUCAqBJMEegChsIT09P Oct 11 08:04:22 np0005481015 certmonger[42467]: LlRFU1ShOTA3oAMCAQGhMDAuGwltZW1jYWNoZWQbIW5wMDAwNTQ4MTAxNS5pbnRl Oct 11 08:04:22 np0005481015 certmonger[42467]: cm5hbGFwaS5vb28udGVzdDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:22 np0005481015 certmonger[42467]: DAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUNIg9hnhGXhRG3FmlTtGUvZVF704wDQYJ Oct 11 08:04:22 np0005481015 certmonger[42467]: KoZIhvcNAQELBQADggEBAHKV/CGQQzOaWHy/pYDfK9/Qp6xwQf97Da8c2nx/qwXA Oct 11 08:04:22 np0005481015 certmonger[42467]: X0naviPK7sLKyYOnx4lM58Wguw/0csRZWNGBAhtW/MAL04YFmvAlFEXo0yY9rcvb Oct 11 08:04:22 np0005481015 certmonger[42467]: pOAR68KEq62mmWZTyF7Sc7QdQ4VEzlm0Z7PoF1Tgjcl4vzmFSoW3hF+afGs1Ux5e Oct 11 08:04:22 np0005481015 certmonger[42467]: eAc0fXNSNq6WbP74Rys4SzaL4bg5oFzGuawfpMNiRlvkgDUR/KkQLOxr9drokIPL Oct 11 08:04:22 np0005481015 certmonger[42467]: nQNOb6g/SqJpYGIOXXv1LyzI+wKxY9SvKdxqvXsVms4Klp+jhAXPnrn/n5wVBupy Oct 11 08:04:22 np0005481015 certmonger[42467]: cssnB08smS+uCbMI1Rv3IC72ZBao4Is/J4PLiqNe+Ts= Oct 11 08:04:22 np0005481015 certmonger[42467]: -----END CERTIFICATE REQUEST----- Oct 11 08:04:22 np0005481015 certmonger[42467]: " for child. Oct 11 08:04:22 np0005481015 certmonger[42467]: 2025-10-11 08:04:22 [42467] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:04:22 np0005481015 certmonger[42467]: 2025-10-11 08:04:22 [42467] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvy2AXiNo9p5uT7PB7BU5DWGnAOTZxAEbtUZsyrjtfPBfv8806EmoC9FNszwtKazhC2G4nmW6ScNkF+x6FpOqwCU4kSH4Nal2Xq/NE0nxAJS2tfBa9+ywu4xQL9PdCWfvcXs8zRngojLlTE5ZOw9mgjkXXu9TdZ4HZkGoMnrAubedAL5HBBqOrFExQWxc5MW51zfyQE6Z9CPAxKBKf+ljXToUI8igIloiTb0TtNF7AyeI8Q4rk02j/9tCqYRMPQr/NosZryadmt3+rmRiJmQo2z8Uf9rWeStTUTkbzr/YWi0QYfCsnRVRkLicMTTvB8NS1wuUCENvwPj/wkgYeeDhvwIDAQAB" for child. Oct 11 08:04:22 np0005481015 certmonger[42467]: 2025-10-11 08:04:22 [42467] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:04:22 np0005481015 certmonger[42467]: 2025-10-11 08:04:22 [42467] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:04:22 np0005481015 certmonger[42467]: 2025-10-11 08:04:22 [42467] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:04:22 np0005481015 certmonger[42467]: 2025-10-11 08:04:22 [42467] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:04:22 np0005481015 certmonger[42467]: 2025-10-11 08:04:22 [42467] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:04:22 np0005481015 certmonger[39512]: 2025-10-11 08:04:22 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:22 np0005481015 certmonger[42467]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:04:23 np0005481015 certmonger[42467]: Certificate: "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" Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Certificate submission still ongoing. Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Certificate submission attempt complete. Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Child status = 0. Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Child output: Oct 11 08:04:23 np0005481015 certmonger[39512]: "-----BEGIN CERTIFICATE----- Oct 11 08:04:23 np0005481015 certmonger[39512]: MIIFXzCCA8egAwIBAgIBOTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:23 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:23 np0005481015 certmonger[39512]: MDQyM1oXDTI3MTAxMjA4MDQyM1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:23 np0005481015 certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:23 np0005481015 certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBAL8tgF4jaPaebk+zwewVOQ1hpwDk2cQBG7VG Oct 11 08:04:23 np0005481015 certmonger[39512]: bMq47XzwX7/PNOhJqAvRTbM8LSms4QthuJ5luknDZBfsehaTqsAlOJEh+DWpdl6v Oct 11 08:04:23 np0005481015 certmonger[39512]: zRNJ8QCUtrXwWvfssLuMUC/T3Qln73F7PM0Z4KIy5UxOWTsPZoI5F17vU3WeB2ZB Oct 11 08:04:23 np0005481015 certmonger[39512]: qDJ6wLm3nQC+RwQajqxRMUFsXOTFudc38kBOmfQjwMSgSn/pY106FCPIoCJaIk29 Oct 11 08:04:23 np0005481015 certmonger[39512]: E7TRewMniPEOK5NNo//bQqmETD0K/zaLGa8mnZrd/q5kYiZkKNs/FH/a1nkrU1E5 Oct 11 08:04:23 np0005481015 certmonger[39512]: G86/2FotEGHwrJ0VUZC4nDE07wfDUtcLlAhDb8D4/8JIGHng4b8CAwEAAaOCAfAw Oct 11 08:04:23 np0005481015 certmonger[39512]: ggHsMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:23 np0005481015 certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:23 np0005481015 certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:23 np0005481015 certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:23 np0005481015 certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:23 np0005481015 certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFI5ytTRmFsxgqA86YhKNHYG/ Oct 11 08:04:23 np0005481015 certmonger[39512]: iHeUMIHJBgNVHREEgcEwgb6CIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:23 np0005481015 certmonger[39512]: dGVzdKBEBgorBgEEAYI3FAIDoDYMNG1lbWNhY2hlZC9ucDAwMDU0ODEwMTUuaW50 Oct 11 08:04:23 np0005481015 certmonger[39512]: ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUwYGKwYBBQICoEkwR6AKGwhPT08u Oct 11 08:04:23 np0005481015 certmonger[39512]: VEVTVKE5MDegAwIBAaEwMC4bCW1lbWNhY2hlZBshbnAwMDA1NDgxMDE1LmludGVy Oct 11 08:04:23 np0005481015 certmonger[39512]: bmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQAp67EG3vxdC+oNliCj Oct 11 08:04:23 np0005481015 certmonger[39512]: GL2sVeE18ETOossxweFEbBR8PlYycGPhfo/dMz4ZFUYGTKpZu9mV7V1ZqOLDJdl8 Oct 11 08:04:23 np0005481015 certmonger[39512]: WHpYUL/leBSvXcVtzfUR/rcOfOuIpNRA7D31Rxo+VevJVvL3NVfVRzMBmSWIP6jM Oct 11 08:04:23 np0005481015 certmonger[39512]: sAWptHrBKJvzT90iPPWRjJIoJqpatcdDSaEtAYtr5pz8yjYsZPqb5OmuJ68AerlF Oct 11 08:04:23 np0005481015 certmonger[39512]: +o+r0r/av0DZ5Vz3UAkROV9Ug+AjVnCHirQo6+HBJLvzvZV7T1wG3RlSsVwfQYTo Oct 11 08:04:23 np0005481015 certmonger[39512]: OblHQPsd+CVMqqixICX32XqPcXjvXa4OjEGfS3T3n23sjsefg8KdPd8JT8mq+afC Oct 11 08:04:23 np0005481015 certmonger[39512]: 7tCku/6QV+kBBiWhv7mle52ERIDs8fqvaZB7zyyNIheUWg3EjYaekdYzI9WPYMSl Oct 11 08:04:23 np0005481015 certmonger[39512]: a7HnayFAO/AYogYK5DqX2FrNpphZDlKYMDSERs9pyiX99cp4+LUuLr9GiFcM2jXp Oct 11 08:04:23 np0005481015 certmonger[39512]: eZf4qlThaJKOinVN35scmD9SEWLViricQ44StFemzCUw+Kc= Oct 11 08:04:23 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:04:23 np0005481015 certmonger[39512]: " Oct 11 08:04:23 np0005481015 certmonger[42469]: 2025-10-11 08:04:23 [42469] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:04:23 np0005481015 certmonger[42469]: MIIFXzCCA8egAwIBAgIBOTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:23 np0005481015 certmonger[42469]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:23 np0005481015 certmonger[42469]: MDQyM1oXDTI3MTAxMjA4MDQyM1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:23 np0005481015 certmonger[42469]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:23 np0005481015 certmonger[42469]: hvcNAQEBBQADggEPADCCAQoCggEBAL8tgF4jaPaebk+zwewVOQ1hpwDk2cQBG7VG Oct 11 08:04:23 np0005481015 certmonger[42469]: bMq47XzwX7/PNOhJqAvRTbM8LSms4QthuJ5luknDZBfsehaTqsAlOJEh+DWpdl6v Oct 11 08:04:23 np0005481015 certmonger[42469]: zRNJ8QCUtrXwWvfssLuMUC/T3Qln73F7PM0Z4KIy5UxOWTsPZoI5F17vU3WeB2ZB Oct 11 08:04:23 np0005481015 certmonger[42469]: qDJ6wLm3nQC+RwQajqxRMUFsXOTFudc38kBOmfQjwMSgSn/pY106FCPIoCJaIk29 Oct 11 08:04:23 np0005481015 certmonger[42469]: E7TRewMniPEOK5NNo//bQqmETD0K/zaLGa8mnZrd/q5kYiZkKNs/FH/a1nkrU1E5 Oct 11 08:04:23 np0005481015 certmonger[42469]: G86/2FotEGHwrJ0VUZC4nDE07wfDUtcLlAhDb8D4/8JIGHng4b8CAwEAAaOCAfAw Oct 11 08:04:23 np0005481015 certmonger[42469]: ggHsMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:23 np0005481015 certmonger[42469]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:23 np0005481015 certmonger[42469]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:23 np0005481015 certmonger[42469]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:23 np0005481015 certmonger[42469]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:23 np0005481015 certmonger[42469]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFI5ytTRmFsxgqA86YhKNHYG/ Oct 11 08:04:23 np0005481015 certmonger[42469]: iHeUMIHJBgNVHREEgcEwgb6CIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:23 np0005481015 certmonger[42469]: dGVzdKBEBgorBgEEAYI3FAIDoDYMNG1lbWNhY2hlZC9ucDAwMDU0ODEwMTUuaW50 Oct 11 08:04:23 np0005481015 certmonger[42469]: ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUwYGKwYBBQICoEkwR6AKGwhPT08u Oct 11 08:04:23 np0005481015 certmonger[42469]: VEVTVKE5MDegAwIBAaEwMC4bCW1lbWNhY2hlZBshbnAwMDA1NDgxMDE1LmludGVy Oct 11 08:04:23 np0005481015 certmonger[42469]: bmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQAp67EG3vxdC+oNliCj Oct 11 08:04:23 np0005481015 certmonger[42469]: GL2sVeE18ETOossxweFEbBR8PlYycGPhfo/dMz4ZFUYGTKpZu9mV7V1ZqOLDJdl8 Oct 11 08:04:23 np0005481015 certmonger[42469]: WHpYUL/leBSvXcVtzfUR/rcOfOuIpNRA7D31Rxo+VevJVvL3NVfVRzMBmSWIP6jM Oct 11 08:04:23 np0005481015 certmonger[42469]: sAWptHrBKJvzT90iPPWRjJIoJqpatcdDSaEtAYtr5pz8yjYsZPqb5OmuJ68AerlF Oct 11 08:04:23 np0005481015 certmonger[42469]: +o+r0r/av0DZ5Vz3UAkROV9Ug+AjVnCHirQo6+HBJLvzvZV7T1wG3RlSsVwfQYTo Oct 11 08:04:23 np0005481015 certmonger[42469]: OblHQPsd+CVMqqixICX32XqPcXjvXa4OjEGfS3T3n23sjsefg8KdPd8JT8mq+afC Oct 11 08:04:23 np0005481015 certmonger[42469]: 7tCku/6QV+kBBiWhv7mle52ERIDs8fqvaZB7zyyNIheUWg3EjYaekdYzI9WPYMSl Oct 11 08:04:23 np0005481015 certmonger[42469]: a7HnayFAO/AYogYK5DqX2FrNpphZDlKYMDSERs9pyiX99cp4+LUuLr9GiFcM2jXp Oct 11 08:04:23 np0005481015 certmonger[42469]: eZf4qlThaJKOinVN35scmD9SEWLViricQ44StFemzCUw+Kc= Oct 11 08:04:23 np0005481015 certmonger[42469]: -----END CERTIFICATE----- Oct 11 08:04:23 np0005481015 certmonger[42469]: ". Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Certificate submission still ongoing. Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Certificate submission postprocessing complete. Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Child status = 0. Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Child output: Oct 11 08:04:23 np0005481015 certmonger[39512]: "{"certificate":"-----BEGIN CERTIFICATE-----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\neZf4qlThaJKOinVN35scmD9SEWLViricQ44StFemzCUw+Kc=\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:04:23 np0005481015 certmonger[39512]: " Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:04:23 np0005481015 certmonger[39512]: MIIFXzCCA8egAwIBAgIBOTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:23 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:23 np0005481015 certmonger[39512]: MDQyM1oXDTI3MTAxMjA4MDQyM1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:23 np0005481015 certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:23 np0005481015 certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBAL8tgF4jaPaebk+zwewVOQ1hpwDk2cQBG7VG Oct 11 08:04:23 np0005481015 certmonger[39512]: bMq47XzwX7/PNOhJqAvRTbM8LSms4QthuJ5luknDZBfsehaTqsAlOJEh+DWpdl6v Oct 11 08:04:23 np0005481015 certmonger[39512]: zRNJ8QCUtrXwWvfssLuMUC/T3Qln73F7PM0Z4KIy5UxOWTsPZoI5F17vU3WeB2ZB Oct 11 08:04:23 np0005481015 certmonger[39512]: qDJ6wLm3nQC+RwQajqxRMUFsXOTFudc38kBOmfQjwMSgSn/pY106FCPIoCJaIk29 Oct 11 08:04:23 np0005481015 certmonger[39512]: E7TRewMniPEOK5NNo//bQqmETD0K/zaLGa8mnZrd/q5kYiZkKNs/FH/a1nkrU1E5 Oct 11 08:04:23 np0005481015 certmonger[39512]: G86/2FotEGHwrJ0VUZC4nDE07wfDUtcLlAhDb8D4/8JIGHng4b8CAwEAAaOCAfAw Oct 11 08:04:23 np0005481015 certmonger[39512]: ggHsMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:23 np0005481015 certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:23 np0005481015 certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:23 np0005481015 certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:23 np0005481015 certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:23 np0005481015 certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFI5ytTRmFsxgqA86YhKNHYG/ Oct 11 08:04:23 np0005481015 certmonger[39512]: iHeUMIHJBgNVHREEgcEwgb6CIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:23 np0005481015 certmonger[39512]: dGVzdKBEBgorBgEEAYI3FAIDoDYMNG1lbWNhY2hlZC9ucDAwMDU0ODEwMTUuaW50 Oct 11 08:04:23 np0005481015 certmonger[39512]: ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUwYGKwYBBQICoEkwR6AKGwhPT08u Oct 11 08:04:23 np0005481015 certmonger[39512]: VEVTVKE5MDegAwIBAaEwMC4bCW1lbWNhY2hlZBshbnAwMDA1NDgxMDE1LmludGVy Oct 11 08:04:23 np0005481015 certmonger[39512]: bmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQAp67EG3vxdC+oNliCj Oct 11 08:04:23 np0005481015 certmonger[39512]: GL2sVeE18ETOossxweFEbBR8PlYycGPhfo/dMz4ZFUYGTKpZu9mV7V1ZqOLDJdl8 Oct 11 08:04:23 np0005481015 certmonger[39512]: WHpYUL/leBSvXcVtzfUR/rcOfOuIpNRA7D31Rxo+VevJVvL3NVfVRzMBmSWIP6jM Oct 11 08:04:23 np0005481015 certmonger[39512]: sAWptHrBKJvzT90iPPWRjJIoJqpatcdDSaEtAYtr5pz8yjYsZPqb5OmuJ68AerlF Oct 11 08:04:23 np0005481015 certmonger[39512]: +o+r0r/av0DZ5Vz3UAkROV9Ug+AjVnCHirQo6+HBJLvzvZV7T1wG3RlSsVwfQYTo Oct 11 08:04:23 np0005481015 certmonger[39512]: OblHQPsd+CVMqqixICX32XqPcXjvXa4OjEGfS3T3n23sjsefg8KdPd8JT8mq+afC Oct 11 08:04:23 np0005481015 certmonger[39512]: 7tCku/6QV+kBBiWhv7mle52ERIDs8fqvaZB7zyyNIheUWg3EjYaekdYzI9WPYMSl Oct 11 08:04:23 np0005481015 certmonger[39512]: a7HnayFAO/AYogYK5DqX2FrNpphZDlKYMDSERs9pyiX99cp4+LUuLr9GiFcM2jXp Oct 11 08:04:23 np0005481015 certmonger[39512]: eZf4qlThaJKOinVN35scmD9SEWLViricQ44StFemzCUw+Kc= Oct 11 08:04:23 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:04:23 np0005481015 certmonger[39512]: ". Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] No hooks set for pre-save command. Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:23 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:23 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:23 np0005481015 certmonger[42540]: Certificate in file "/etc/pki/tls/certs/memcached.crt" issued by CA and saved. Oct 11 08:04:23 np0005481015 certmonger[39512]: 2025-10-11 08:04:23 [39512] Wrote to /var/lib/certmonger/requests/20251011080422 Oct 11 08:04:24 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:24 np0005481015 python3[42556]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:04:25 np0005481015 python3[42576]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:04:28 np0005481015 python3[42593]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:04:31 np0005481015 python3[42610]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:04:32 np0005481015 python3[42626]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:04:32 np0005481015 python3[42642]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:04:33 np0005481015 python3[42660]: ansible-certificate_request Invoked with name=metrics_qdr dns=['np0005481015.internalapi.ooo.test'] principal=['metrics_qdr/np0005481015.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep metrics_qdr)#012service_crt="/etc/pki/tls/certs/metrics_qdr.crt"#012service_key="/etc/pki/tls/private/metrics_qdr.key#012# Copy the new cert from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec "$container_name" chown qdrouterd:qdrouterd "$service_crt"#012podman exec "$container_name" chown qdrouterd:qdrouterd "$service_key"#012# Trigger a container restart to read the new certificate#012podman restart "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:04:33 np0005481015 certmonger[39512]: 2025-10-11 08:04:33 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:33 np0005481015 certmonger[39512]: 2025-10-11 08:04:33 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:33 np0005481015 certmonger[39512]: 2025-10-11 08:04:33 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:33 np0005481015 certmonger[39512]: 2025-10-11 08:04:33 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:33 np0005481015 certmonger[39512]: 2025-10-11 08:04:33 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:33 np0005481015 certmonger[39512]: 2025-10-11 08:04:33 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:33 np0005481015 certmonger[39512]: 2025-10-11 08:04:33 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:33 np0005481015 certmonger[39512]: 2025-10-11 08:04:33 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:33 np0005481015 certmonger[39512]: 2025-10-11 08:04:33 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[42670]: 2025-10-11 08:04:34 [42670] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481015.internalapi.ooo.test" for child. Oct 11 08:04:34 np0005481015 certmonger[42670]: 2025-10-11 08:04:34 [42670] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481015.internalapi.ooo.test Oct 11 08:04:34 np0005481015 certmonger[42670]: " for child. Oct 11 08:04:34 np0005481015 certmonger[42670]: 2025-10-11 08:04:34 [42670] Setting "CERTMONGER_REQ_PRINCIPAL" to "metrics_qdr/np0005481015.internalapi.ooo.test@OOO.TEST Oct 11 08:04:34 np0005481015 certmonger[42670]: " for child. Oct 11 08:04:34 np0005481015 certmonger[42670]: 2025-10-11 08:04:34 [42670] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:04:34 np0005481015 certmonger[42670]: 2025-10-11 08:04:34 [42670] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:04:34 np0005481015 certmonger[42670]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDE1LmludGVybmFsYXBp Oct 11 08:04:34 np0005481015 certmonger[42670]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA55f8Z9T5 Oct 11 08:04:34 np0005481015 certmonger[42670]: 95YHdDnLsxb8br9domV4WmuYyTY6bGL0GerLe/RTCApzy+t3DpxL/+hwXcD+WAZw Oct 11 08:04:34 np0005481015 certmonger[42670]: +xdg3F5dYsDz/nXy7fxGn2LtMZhSrfJHZD0+CvcnPMTBACTpSlg0iTvhZSffD/Je Oct 11 08:04:34 np0005481015 certmonger[42670]: sewYoHmS/CQ9vDvlj5EmocWpS2XFL3LP6kYPKpO3GxfyRKsxUtxZcGqccpUS7CYE Oct 11 08:04:34 np0005481015 certmonger[42670]: dUpB6q5OXGfIpeI4osOxEjnHSEHyUjF3dUTBAEMrYRPjBBxXN1iRfkZWaF9H4SmX Oct 11 08:04:34 np0005481015 certmonger[42670]: sStWPGtw97AjYRxXWvAfENQMyXKI7QrSfEZVQecg3O0wUmHo3zThKfGYjPuR0KqF Oct 11 08:04:34 np0005481015 certmonger[42670]: OWkUq6tevg4mKQIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:04:34 np0005481015 certmonger[42670]: ADEAMQAwADgAMAA0ADMAMzCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Oct 11 08:04:34 np0005481015 certmonger[42670]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU0ODEwMTUuaW50ZXJuYWxhcGkub29v Oct 11 08:04:34 np0005481015 certmonger[42670]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZtZXRyaWNzX3Fkci9ucDAwMDU0ODEwMTUu Oct 11 08:04:34 np0005481015 certmonger[42670]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Oct 11 08:04:34 np0005481015 certmonger[42670]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC21ldHJpY3NfcWRyGyFucDAwMDU0ODEwMTUu Oct 11 08:04:34 np0005481015 certmonger[42670]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Oct 11 08:04:34 np0005481015 certmonger[42670]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFDSIPYZ4Rl4URtxZpU7RlL2VRe9O Oct 11 08:04:34 np0005481015 certmonger[42670]: MA0GCSqGSIb3DQEBCwUAA4IBAQBO25fL/8ykhlxJhGrzp++av5fRxhuptZH5M4pt Oct 11 08:04:34 np0005481015 certmonger[42670]: NeeU0yT41PIWBGOH6xUGeQIUYC/Jw/3U+OGxnB1qBIZwTXOmEDshNt5noGWYIVzP Oct 11 08:04:34 np0005481015 certmonger[42670]: x/RNogWpsJP9gEoGj7yoeHb2su6NuRsF8cADi2tH25+qUSdPt8/N5cPnQnH7aBXe Oct 11 08:04:34 np0005481015 certmonger[42670]: QoNR/m+BevMn4DDkJFmDkWqXQBUu5Lbvu6S7dx0gyvypFX++cnbC0QbhFaG9vylP Oct 11 08:04:34 np0005481015 certmonger[42670]: 9CyNdREjCYup8LjKt82moQ+dB6zynLGdhjmCrXqK/yLmCKbjXmMhyIZ52arnzErX Oct 11 08:04:34 np0005481015 certmonger[42670]: +ta29XYrexNGsikDcc68CIoHu3NrkeHnK19/ALOfpPKk29Wc Oct 11 08:04:34 np0005481015 certmonger[42670]: -----END CERTIFICATE REQUEST----- Oct 11 08:04:34 np0005481015 certmonger[42670]: " for child. Oct 11 08:04:34 np0005481015 certmonger[42670]: 2025-10-11 08:04:34 [42670] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:04:34 np0005481015 certmonger[42670]: 2025-10-11 08:04:34 [42670] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA55f8Z9T595YHdDnLsxb8br9domV4WmuYyTY6bGL0GerLe/RTCApzy+t3DpxL/+hwXcD+WAZw+xdg3F5dYsDz/nXy7fxGn2LtMZhSrfJHZD0+CvcnPMTBACTpSlg0iTvhZSffD/JesewYoHmS/CQ9vDvlj5EmocWpS2XFL3LP6kYPKpO3GxfyRKsxUtxZcGqccpUS7CYEdUpB6q5OXGfIpeI4osOxEjnHSEHyUjF3dUTBAEMrYRPjBBxXN1iRfkZWaF9H4SmXsStWPGtw97AjYRxXWvAfENQMyXKI7QrSfEZVQecg3O0wUmHo3zThKfGYjPuR0KqFOWkUq6tevg4mKQIDAQAB" for child. Oct 11 08:04:34 np0005481015 certmonger[42670]: 2025-10-11 08:04:34 [42670] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:04:34 np0005481015 certmonger[42670]: 2025-10-11 08:04:34 [42670] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:04:34 np0005481015 certmonger[42670]: 2025-10-11 08:04:34 [42670] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:04:34 np0005481015 certmonger[42670]: 2025-10-11 08:04:34 [42670] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:04:34 np0005481015 certmonger[42670]: 2025-10-11 08:04:34 [42670] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[42670]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:04:34 np0005481015 certmonger[42670]: Certificate: "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" Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Certificate submission still ongoing. Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Certificate submission attempt complete. Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Child status = 0. Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Child output: Oct 11 08:04:34 np0005481015 certmonger[39512]: "-----BEGIN CERTIFICATE----- Oct 11 08:04:34 np0005481015 certmonger[39512]: MIIFYzCCA8ugAwIBAgIBPTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:34 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:34 np0005481015 certmonger[39512]: MDQzNFoXDTI3MTAxMjA4MDQzNFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:34 np0005481015 certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:34 np0005481015 certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBAOeX/GfU+feWB3Q5y7MW/G6/XaJleFprmMk2 Oct 11 08:04:34 np0005481015 certmonger[39512]: Omxi9Bnqy3v0UwgKc8vrdw6cS//ocF3A/lgGcPsXYNxeXWLA8/518u38Rp9i7TGY Oct 11 08:04:34 np0005481015 certmonger[39512]: Uq3yR2Q9Pgr3JzzEwQAk6UpYNIk74WUn3w/yXrHsGKB5kvwkPbw75Y+RJqHFqUtl Oct 11 08:04:34 np0005481015 certmonger[39512]: xS9yz+pGDyqTtxsX8kSrMVLcWXBqnHKVEuwmBHVKQequTlxnyKXiOKLDsRI5x0hB Oct 11 08:04:34 np0005481015 certmonger[39512]: 8lIxd3VEwQBDK2ET4wQcVzdYkX5GVmhfR+Epl7ErVjxrcPewI2EcV1rwHxDUDMly Oct 11 08:04:34 np0005481015 certmonger[39512]: iO0K0nxGVUHnINztMFJh6N804SnxmIz7kdCqhTlpFKurXr4OJikCAwEAAaOCAfQw Oct 11 08:04:34 np0005481015 certmonger[39512]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:34 np0005481015 certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:34 np0005481015 certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:34 np0005481015 certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:34 np0005481015 certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:34 np0005481015 certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOUymHqMxcL3aN+nuGYyaXuW Oct 11 08:04:34 np0005481015 certmonger[39512]: UT8KMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:34 np0005481015 certmonger[39512]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm1ldHJpY3NfcWRyL25wMDAwNTQ4MTAxNS5p Oct 11 08:04:34 np0005481015 certmonger[39512]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:04:34 np0005481015 certmonger[39512]: Ty5URVNUoTswOaADAgEBoTIwMBsLbWV0cmljc19xZHIbIW5wMDAwNTQ4MTAxNS5p Oct 11 08:04:34 np0005481015 certmonger[39512]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAD5hORJqGj7c3 Oct 11 08:04:34 np0005481015 certmonger[39512]: QW5EkfC18JEzSHx+0S3FKW6OFMLsM2se6ORpfTxm2AQDMwvn/QL/hzd4A4u+gvVh Oct 11 08:04:34 np0005481015 certmonger[39512]: rxlprHE/gSFB6hawRyo0amJ3KiGF6pzWR8xgG16+Dtb2CCltqx4zGzGR7CA/KnIl Oct 11 08:04:34 np0005481015 certmonger[39512]: Y/mc/mt0sBWHGfYEinfQJfJKz7h90+7vM9BByF4qVllATc1FXSVZOMe6F4Su2/2g Oct 11 08:04:34 np0005481015 certmonger[39512]: OahUO/Unxai35hW/qUn9eDiQ3HyL7TqLgo86s3jDXQaSd7stwXjBRH+HPZ8Lq1Pj Oct 11 08:04:34 np0005481015 certmonger[39512]: dMVe5CqW9Moc8dS7yLQhwGVqId1Fs+rzY1iLoDSEI0ah7fYF7mhmqcQcgTPMn6Jr Oct 11 08:04:34 np0005481015 certmonger[39512]: uROrx6nBdfVlTtyLcwZUN7M5Eq/Rzdao6hFNuARfwDrkU2KnjJJ/h540oQeEu+CR Oct 11 08:04:34 np0005481015 certmonger[39512]: LjsZdNfg5CTQhBGIIfTh7SVRmu06UeKrnL5yboBkx5tjNcL0V+v6ucNe2FipkjRa Oct 11 08:04:34 np0005481015 certmonger[39512]: KDy/P2qc341Q0pAZvB9A5vkUF4Y1iG52CBqh2hqLxjXbiT7veQje Oct 11 08:04:34 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:04:34 np0005481015 certmonger[39512]: " Oct 11 08:04:34 np0005481015 certmonger[42672]: 2025-10-11 08:04:34 [42672] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:04:34 np0005481015 certmonger[42672]: MIIFYzCCA8ugAwIBAgIBPTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:34 np0005481015 certmonger[42672]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:34 np0005481015 certmonger[42672]: MDQzNFoXDTI3MTAxMjA4MDQzNFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:34 np0005481015 certmonger[42672]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:34 np0005481015 certmonger[42672]: hvcNAQEBBQADggEPADCCAQoCggEBAOeX/GfU+feWB3Q5y7MW/G6/XaJleFprmMk2 Oct 11 08:04:34 np0005481015 certmonger[42672]: Omxi9Bnqy3v0UwgKc8vrdw6cS//ocF3A/lgGcPsXYNxeXWLA8/518u38Rp9i7TGY Oct 11 08:04:34 np0005481015 certmonger[42672]: Uq3yR2Q9Pgr3JzzEwQAk6UpYNIk74WUn3w/yXrHsGKB5kvwkPbw75Y+RJqHFqUtl Oct 11 08:04:34 np0005481015 certmonger[42672]: xS9yz+pGDyqTtxsX8kSrMVLcWXBqnHKVEuwmBHVKQequTlxnyKXiOKLDsRI5x0hB Oct 11 08:04:34 np0005481015 certmonger[42672]: 8lIxd3VEwQBDK2ET4wQcVzdYkX5GVmhfR+Epl7ErVjxrcPewI2EcV1rwHxDUDMly Oct 11 08:04:34 np0005481015 certmonger[42672]: iO0K0nxGVUHnINztMFJh6N804SnxmIz7kdCqhTlpFKurXr4OJikCAwEAAaOCAfQw Oct 11 08:04:34 np0005481015 certmonger[42672]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:34 np0005481015 certmonger[42672]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:34 np0005481015 certmonger[42672]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:34 np0005481015 certmonger[42672]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:34 np0005481015 certmonger[42672]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:34 np0005481015 certmonger[42672]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOUymHqMxcL3aN+nuGYyaXuW Oct 11 08:04:34 np0005481015 certmonger[42672]: UT8KMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:34 np0005481015 certmonger[42672]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm1ldHJpY3NfcWRyL25wMDAwNTQ4MTAxNS5p Oct 11 08:04:34 np0005481015 certmonger[42672]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:04:34 np0005481015 certmonger[42672]: Ty5URVNUoTswOaADAgEBoTIwMBsLbWV0cmljc19xZHIbIW5wMDAwNTQ4MTAxNS5p Oct 11 08:04:34 np0005481015 certmonger[42672]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAD5hORJqGj7c3 Oct 11 08:04:34 np0005481015 certmonger[42672]: QW5EkfC18JEzSHx+0S3FKW6OFMLsM2se6ORpfTxm2AQDMwvn/QL/hzd4A4u+gvVh Oct 11 08:04:34 np0005481015 certmonger[42672]: rxlprHE/gSFB6hawRyo0amJ3KiGF6pzWR8xgG16+Dtb2CCltqx4zGzGR7CA/KnIl Oct 11 08:04:34 np0005481015 certmonger[42672]: Y/mc/mt0sBWHGfYEinfQJfJKz7h90+7vM9BByF4qVllATc1FXSVZOMe6F4Su2/2g Oct 11 08:04:34 np0005481015 certmonger[42672]: OahUO/Unxai35hW/qUn9eDiQ3HyL7TqLgo86s3jDXQaSd7stwXjBRH+HPZ8Lq1Pj Oct 11 08:04:34 np0005481015 certmonger[42672]: dMVe5CqW9Moc8dS7yLQhwGVqId1Fs+rzY1iLoDSEI0ah7fYF7mhmqcQcgTPMn6Jr Oct 11 08:04:34 np0005481015 certmonger[42672]: uROrx6nBdfVlTtyLcwZUN7M5Eq/Rzdao6hFNuARfwDrkU2KnjJJ/h540oQeEu+CR Oct 11 08:04:34 np0005481015 certmonger[42672]: LjsZdNfg5CTQhBGIIfTh7SVRmu06UeKrnL5yboBkx5tjNcL0V+v6ucNe2FipkjRa Oct 11 08:04:34 np0005481015 certmonger[42672]: KDy/P2qc341Q0pAZvB9A5vkUF4Y1iG52CBqh2hqLxjXbiT7veQje Oct 11 08:04:34 np0005481015 certmonger[42672]: -----END CERTIFICATE----- Oct 11 08:04:34 np0005481015 certmonger[42672]: ". Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Certificate submission still ongoing. Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Certificate submission postprocessing complete. Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Child status = 0. Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Child output: Oct 11 08:04:34 np0005481015 certmonger[39512]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nKDy/P2qc341Q0pAZvB9A5vkUF4Y1iG52CBqh2hqLxjXbiT7veQje\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:04:34 np0005481015 certmonger[39512]: " Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:04:34 np0005481015 certmonger[39512]: MIIFYzCCA8ugAwIBAgIBPTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:34 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:34 np0005481015 certmonger[39512]: MDQzNFoXDTI3MTAxMjA4MDQzNFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:34 np0005481015 certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:34 np0005481015 certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBAOeX/GfU+feWB3Q5y7MW/G6/XaJleFprmMk2 Oct 11 08:04:34 np0005481015 certmonger[39512]: Omxi9Bnqy3v0UwgKc8vrdw6cS//ocF3A/lgGcPsXYNxeXWLA8/518u38Rp9i7TGY Oct 11 08:04:34 np0005481015 certmonger[39512]: Uq3yR2Q9Pgr3JzzEwQAk6UpYNIk74WUn3w/yXrHsGKB5kvwkPbw75Y+RJqHFqUtl Oct 11 08:04:34 np0005481015 certmonger[39512]: xS9yz+pGDyqTtxsX8kSrMVLcWXBqnHKVEuwmBHVKQequTlxnyKXiOKLDsRI5x0hB Oct 11 08:04:34 np0005481015 certmonger[39512]: 8lIxd3VEwQBDK2ET4wQcVzdYkX5GVmhfR+Epl7ErVjxrcPewI2EcV1rwHxDUDMly Oct 11 08:04:34 np0005481015 certmonger[39512]: iO0K0nxGVUHnINztMFJh6N804SnxmIz7kdCqhTlpFKurXr4OJikCAwEAAaOCAfQw Oct 11 08:04:34 np0005481015 certmonger[39512]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:34 np0005481015 certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:34 np0005481015 certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:34 np0005481015 certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:34 np0005481015 certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:34 np0005481015 certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOUymHqMxcL3aN+nuGYyaXuW Oct 11 08:04:34 np0005481015 certmonger[39512]: UT8KMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:34 np0005481015 certmonger[39512]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm1ldHJpY3NfcWRyL25wMDAwNTQ4MTAxNS5p Oct 11 08:04:34 np0005481015 certmonger[39512]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:04:34 np0005481015 certmonger[39512]: Ty5URVNUoTswOaADAgEBoTIwMBsLbWV0cmljc19xZHIbIW5wMDAwNTQ4MTAxNS5p Oct 11 08:04:34 np0005481015 certmonger[39512]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAD5hORJqGj7c3 Oct 11 08:04:34 np0005481015 certmonger[39512]: QW5EkfC18JEzSHx+0S3FKW6OFMLsM2se6ORpfTxm2AQDMwvn/QL/hzd4A4u+gvVh Oct 11 08:04:34 np0005481015 certmonger[39512]: rxlprHE/gSFB6hawRyo0amJ3KiGF6pzWR8xgG16+Dtb2CCltqx4zGzGR7CA/KnIl Oct 11 08:04:34 np0005481015 certmonger[39512]: Y/mc/mt0sBWHGfYEinfQJfJKz7h90+7vM9BByF4qVllATc1FXSVZOMe6F4Su2/2g Oct 11 08:04:34 np0005481015 certmonger[39512]: OahUO/Unxai35hW/qUn9eDiQ3HyL7TqLgo86s3jDXQaSd7stwXjBRH+HPZ8Lq1Pj Oct 11 08:04:34 np0005481015 certmonger[39512]: dMVe5CqW9Moc8dS7yLQhwGVqId1Fs+rzY1iLoDSEI0ah7fYF7mhmqcQcgTPMn6Jr Oct 11 08:04:34 np0005481015 certmonger[39512]: uROrx6nBdfVlTtyLcwZUN7M5Eq/Rzdao6hFNuARfwDrkU2KnjJJ/h540oQeEu+CR Oct 11 08:04:34 np0005481015 certmonger[39512]: LjsZdNfg5CTQhBGIIfTh7SVRmu06UeKrnL5yboBkx5tjNcL0V+v6ucNe2FipkjRa Oct 11 08:04:34 np0005481015 certmonger[39512]: KDy/P2qc341Q0pAZvB9A5vkUF4Y1iG52CBqh2hqLxjXbiT7veQje Oct 11 08:04:34 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:04:34 np0005481015 certmonger[39512]: ". Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] No hooks set for pre-save command. Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:34 np0005481015 certmonger[42692]: Certificate in file "/etc/pki/tls/certs/metrics_qdr.crt" issued by CA and saved. Oct 11 08:04:34 np0005481015 certmonger[39512]: 2025-10-11 08:04:34 [39512] Wrote to /var/lib/certmonger/requests/20251011080433 Oct 11 08:04:35 np0005481015 python3[42708]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:04:36 np0005481015 python3[42728]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:04:39 np0005481015 python3[42745]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:04:42 np0005481015 python3[42762]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:04:43 np0005481015 python3[42778]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:04:43 np0005481015 python3[42794]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:04:45 np0005481015 python3[42812]: ansible-certificate_request Invoked with name=mysql dns=['np0005481015.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['mysql/np0005481015.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Oct 11 08:04:45 np0005481015 certmonger[39512]: 2025-10-11 08:04:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:45 np0005481015 certmonger[39512]: 2025-10-11 08:04:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:45 np0005481015 certmonger[39512]: 2025-10-11 08:04:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:45 np0005481015 certmonger[39512]: 2025-10-11 08:04:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:45 np0005481015 certmonger[39512]: 2025-10-11 08:04:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:45 np0005481015 certmonger[39512]: 2025-10-11 08:04:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:45 np0005481015 certmonger[39512]: 2025-10-11 08:04:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:45 np0005481015 certmonger[39512]: 2025-10-11 08:04:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:45 np0005481015 certmonger[39512]: 2025-10-11 08:04:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:45 np0005481015 certmonger[39512]: 2025-10-11 08:04:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:45 np0005481015 certmonger[39512]: 2025-10-11 08:04:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:45 np0005481015 certmonger[39512]: 2025-10-11 08:04:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:45 np0005481015 certmonger[39512]: 2025-10-11 08:04:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:45 np0005481015 certmonger[39512]: 2025-10-11 08:04:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:45 np0005481015 certmonger[39512]: 2025-10-11 08:04:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:45 np0005481015 certmonger[39512]: 2025-10-11 08:04:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:45 np0005481015 certmonger[39512]: 2025-10-11 08:04:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:45 np0005481015 certmonger[42822]: 2025-10-11 08:04:45 [42822] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481015.internalapi.ooo.test" for child. Oct 11 08:04:45 np0005481015 certmonger[42822]: 2025-10-11 08:04:45 [42822] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481015.internalapi.ooo.test Oct 11 08:04:45 np0005481015 certmonger[42822]: overcloud.internalapi.ooo.test Oct 11 08:04:45 np0005481015 certmonger[42822]: " for child. Oct 11 08:04:45 np0005481015 certmonger[42822]: 2025-10-11 08:04:45 [42822] Setting "CERTMONGER_REQ_PRINCIPAL" to "mysql/np0005481015.internalapi.ooo.test@OOO.TEST Oct 11 08:04:45 np0005481015 certmonger[42822]: " for child. Oct 11 08:04:45 np0005481015 certmonger[42822]: 2025-10-11 08:04:45 [42822] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:04:45 np0005481015 certmonger[42822]: 2025-10-11 08:04:45 [42822] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:04:45 np0005481015 certmonger[42822]: MIID9DCCAtwCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDE1LmludGVybmFsYXBp Oct 11 08:04:45 np0005481015 certmonger[42822]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAi8jUPl1u Oct 11 08:04:45 np0005481015 certmonger[42822]: 16VyIxbsGfZ7IfKAagTjYtha4pHpseY1HHLfNQTkB40iyVjp+yZY8YXxQKNPI0ys Oct 11 08:04:45 np0005481015 certmonger[42822]: /mKIL8YUAgQtT+KB+HzZ9oQCiaFCsoMKXoE7WshhB2ndCwG0jhYT+n8HqYjF1k2W Oct 11 08:04:45 np0005481015 certmonger[42822]: QscuQSUixXygltq0sEj4ZmosFoLJGWMm1IHBvHbhX2bVEyyOSvVDsOwGVpIarQCQ Oct 11 08:04:45 np0005481015 certmonger[42822]: NXOP5O7AFimc9HrVrzNWnIaLZOyB/sYhVFIl/67Lrq6ZMArmDR8GoqGjiiSbUxid Oct 11 08:04:45 np0005481015 certmonger[42822]: A8LEUuJZxKBl2axX8QI0xCgDr2LSde1o9O2ipRheM2M6zDnNthBnsx/MGgdZ7z6q Oct 11 08:04:45 np0005481015 certmonger[42822]: WZVqBFeLqxlfDQIDAQABoIIBgTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:04:45 np0005481015 certmonger[42822]: ADEAMQAwADgAMAA0ADQANTCCAVAGCSqGSIb3DQEJDjGCAUEwggE9MAsGA1UdDwQE Oct 11 08:04:45 np0005481015 certmonger[42822]: AwIFoDCB4QYDVR0RBIHZMIHWgiFucDAwMDU0ODEwMTUuaW50ZXJuYWxhcGkub29v Oct 11 08:04:45 np0005481015 certmonger[42822]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBABgorBgEEAYI3 Oct 11 08:04:45 np0005481015 certmonger[42822]: FAIDoDIMMG15c3FsL25wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdEBP Oct 11 08:04:45 np0005481015 certmonger[42822]: T08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNUoTUwM6ADAgEBoSwwKhsF Oct 11 08:04:45 np0005481015 certmonger[42822]: bXlzcWwbIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDAdBgNVHSUE Oct 11 08:04:45 np0005481015 certmonger[42822]: FjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU Oct 11 08:04:45 np0005481015 certmonger[42822]: NIg9hnhGXhRG3FmlTtGUvZVF704wDQYJKoZIhvcNAQELBQADggEBADaEN/W9qVpA Oct 11 08:04:45 np0005481015 certmonger[42822]: o4l+8ebCnzNs310VJ8HCwDKHmcbWuN30RI4NuRMIfaBMl6D1mBIpB+75ORAr3SBf Oct 11 08:04:45 np0005481015 certmonger[42822]: P4qPx3bsGifFtoHb1jqJGJ0LK3Jm19Lsr3SkHlWAEy4VcerZjP/wYVeUe0ZKYcjk Oct 11 08:04:45 np0005481015 certmonger[42822]: hsT6r8ATeaVmsZzlhNWOElWfykXctGbZpmJSA70ZwrUbrhtMl8IePU+m8LkbFV+H Oct 11 08:04:45 np0005481015 certmonger[42822]: JMyswJXca5erWifKhuXRTOaB2itv5E2Mn2Q7zkpm2qk9ZrFlMrr55BR6SNeWK1eX Oct 11 08:04:45 np0005481015 certmonger[42822]: K1vwEMg4CNof5asswdFk4PQPpZGt9TvSeOl5cC78fJBsL4TPl5OsPA8S1ZhrCQ4N Oct 11 08:04:45 np0005481015 certmonger[42822]: cHaoWwzg8uk= Oct 11 08:04:45 np0005481015 certmonger[42822]: -----END CERTIFICATE REQUEST----- Oct 11 08:04:45 np0005481015 certmonger[42822]: " for child. Oct 11 08:04:45 np0005481015 certmonger[42822]: 2025-10-11 08:04:45 [42822] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCLyNQ+XW7XpXIjFuwZ9nsh8oBqBONi2Frikemx5jUcct81BOQHjSLJWOn7JljxhfFAo08jTKz+YogvxhQCBC1P4oH4fNn2hAKJoUKygwpegTtayGEHad0LAbSOFhP6fwepiMXWTZZCxy5BJSLFfKCW2rSwSPhmaiwWgskZYybUgcG8duFfZtUTLI5K9UOw7AZWkhqtAJA1c4/k7sAWKZz0etWvM1achotk7IH+xiFUUiX/rsuurpkwCuYNHwaioaOKJJtTGJ0DwsRS4lnEoGXZrFfxAjTEKAOvYtJ17Wj07aKlGF4zYzrMOc22EGezH8waB1nvPqpZlWoEV4urGV8NAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAhHM552t9yBLeEwscBfxBKy18jTaJMjp8B0WFTQQMgKzAFkEm5h6c+uFNOTztArZEbXsCZLjfg8q4G3Va6QlHt1jifodAmx0IGfdfaR6zNzc3+1J/bJ3ahdIAhGxz8Cf5qJDMU5NMZelEMhaQC/ddLa+MGCNP/Wxq1BHNAeOnBAkmXgCHkVU1Q25uHUAbvScLLrc63pfebtXDcXJbu1H0GevaHyuZ3iBNaKVcYydK3V8PYb/hRxC+dCeGyf192Qk8oB1fMA7/kWxhOcGVapul+os30+wEOfRdHxVh3ioNVAFJStYVBwY+FzIfZPylM9I9tOmvXroJyzUxZErWcevZVQ==" for child. Oct 11 08:04:45 np0005481015 certmonger[42822]: 2025-10-11 08:04:45 [42822] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAi8jUPl1u16VyIxbsGfZ7IfKAagTjYtha4pHpseY1HHLfNQTkB40iyVjp+yZY8YXxQKNPI0ys/mKIL8YUAgQtT+KB+HzZ9oQCiaFCsoMKXoE7WshhB2ndCwG0jhYT+n8HqYjF1k2WQscuQSUixXygltq0sEj4ZmosFoLJGWMm1IHBvHbhX2bVEyyOSvVDsOwGVpIarQCQNXOP5O7AFimc9HrVrzNWnIaLZOyB/sYhVFIl/67Lrq6ZMArmDR8GoqGjiiSbUxidA8LEUuJZxKBl2axX8QI0xCgDr2LSde1o9O2ipRheM2M6zDnNthBnsx/MGgdZ7z6qWZVqBFeLqxlfDQIDAQAB" for child. Oct 11 08:04:45 np0005481015 certmonger[42822]: 2025-10-11 08:04:45 [42822] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:04:45 np0005481015 certmonger[42822]: 2025-10-11 08:04:45 [42822] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:04:45 np0005481015 certmonger[42822]: 2025-10-11 08:04:45 [42822] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:04:45 np0005481015 certmonger[42822]: 2025-10-11 08:04:45 [42822] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:04:45 np0005481015 certmonger[42822]: 2025-10-11 08:04:45 [42822] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:04:45 np0005481015 certmonger[39512]: 2025-10-11 08:04:45 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:45 np0005481015 certmonger[42822]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:04:46 np0005481015 certmonger[42822]: Certificate: "MIIFdzCCA9+gAwIBAgIBQDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4MDQ0NloXDTI3MTAxMjA4MDQ0NlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIvI1D5dbtelciMW7Bn2eyHygGoE42LYWuKR6bHmNRxy3zUE5AeNIslY6fsmWPGF8UCjTyNMrP5iiC/GFAIELU/igfh82faEAomhQrKDCl6BO1rIYQdp3QsBtI4WE/p/B6mIxdZNlkLHLkElIsV8oJbatLBI+GZqLBaCyRljJtSBwbx24V9m1RMsjkr1Q7DsBlaSGq0AkDVzj+TuwBYpnPR61a8zVpyGi2Tsgf7GIVRSJf+uy66umTAK5g0fBqKho4okm1MYnQPCxFLiWcSgZdmsV/ECNMQoA69i0nXtaPTtoqUYXjNjOsw5zbYQZ7MfzBoHWe8+qlmVagRXi6sZXw0CAwEAAaOCAggwggIEMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFN4UA/8WaK0ATdILO5GxMkDMLwBDMIHhBgNVHREEgdkwgdaCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcUAgOgMgwwbXlzcWwvbnAwMDA1NDgxMDE1LmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVteXNxbBshbnAwMDA1NDgxMDE1LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQCt45+6RUNaH2cPFnM3lE/LeBjdMniEoB/uzNp2OJaZYFNM7bebH17vNEYRmH2TA8cfh4NxF+1om7lh6zbHOu7gyDIo9HhuNXBUkSpHxarwoka7HEfw82JJrviamD09dwaHqQ9h6dpcnS8TFXY+Jfmplcv66OuyJxLVrpY4qqkgCDoMATJEHM2oOnlRODdKJ+MGXzkxfVxkuQvajxdfniMfFoYERwHLJJeXEHsL+MNgpqmtmZi2UydKGssKdwQNzXlCVEYea3i/87OGchXEB+/l3SVpDbaIwdik2V1w9RjqSnyUuYJ4OKd8n2UOCF/cz570otJeEl2ZtPcm++659gro+wC2ZYNmHAIEna8mRhjGtTqRj5Jum3WEexmUccLOhb7rsaRlFa8DdKvKcuFsyepu7kH/b7Ypulrv8wrak9FGj5w2S6uk7sFFpwUrOjrOhHD/fB2FqEVaTVORfAoan/VNzTCyAth0mVg74FcLeY7tVYlt5cLckl+ynDCGfQOJQ8k=" Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Certificate submission still ongoing. Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Certificate submission attempt complete. Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Child status = 0. Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Child output: Oct 11 08:04:46 np0005481015 certmonger[39512]: "-----BEGIN CERTIFICATE----- Oct 11 08:04:46 np0005481015 certmonger[39512]: MIIFdzCCA9+gAwIBAgIBQDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:46 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:46 np0005481015 certmonger[39512]: MDQ0NloXDTI3MTAxMjA4MDQ0NlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:46 np0005481015 certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:46 np0005481015 certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBAIvI1D5dbtelciMW7Bn2eyHygGoE42LYWuKR Oct 11 08:04:46 np0005481015 certmonger[39512]: 6bHmNRxy3zUE5AeNIslY6fsmWPGF8UCjTyNMrP5iiC/GFAIELU/igfh82faEAomh Oct 11 08:04:46 np0005481015 certmonger[39512]: QrKDCl6BO1rIYQdp3QsBtI4WE/p/B6mIxdZNlkLHLkElIsV8oJbatLBI+GZqLBaC Oct 11 08:04:46 np0005481015 certmonger[39512]: yRljJtSBwbx24V9m1RMsjkr1Q7DsBlaSGq0AkDVzj+TuwBYpnPR61a8zVpyGi2Ts Oct 11 08:04:46 np0005481015 certmonger[39512]: gf7GIVRSJf+uy66umTAK5g0fBqKho4okm1MYnQPCxFLiWcSgZdmsV/ECNMQoA69i Oct 11 08:04:46 np0005481015 certmonger[39512]: 0nXtaPTtoqUYXjNjOsw5zbYQZ7MfzBoHWe8+qlmVagRXi6sZXw0CAwEAAaOCAggw Oct 11 08:04:46 np0005481015 certmonger[39512]: ggIEMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:46 np0005481015 certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:46 np0005481015 certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:46 np0005481015 certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:46 np0005481015 certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:46 np0005481015 certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFN4UA/8WaK0ATdILO5GxMkDM Oct 11 08:04:46 np0005481015 certmonger[39512]: LwBDMIHhBgNVHREEgdkwgdaCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:46 np0005481015 certmonger[39512]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Oct 11 08:04:46 np0005481015 certmonger[39512]: AgOgMgwwbXlzcWwvbnAwMDA1NDgxMDE1LmludGVybmFsYXBpLm9vby50ZXN0QE9P Oct 11 08:04:46 np0005481015 certmonger[39512]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVt Oct 11 08:04:46 np0005481015 certmonger[39512]: eXNxbBshbnAwMDA1NDgxMDE1LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Oct 11 08:04:46 np0005481015 certmonger[39512]: DQEBCwUAA4IBgQCt45+6RUNaH2cPFnM3lE/LeBjdMniEoB/uzNp2OJaZYFNM7beb Oct 11 08:04:46 np0005481015 certmonger[39512]: H17vNEYRmH2TA8cfh4NxF+1om7lh6zbHOu7gyDIo9HhuNXBUkSpHxarwoka7HEfw Oct 11 08:04:46 np0005481015 certmonger[39512]: 82JJrviamD09dwaHqQ9h6dpcnS8TFXY+Jfmplcv66OuyJxLVrpY4qqkgCDoMATJE Oct 11 08:04:46 np0005481015 certmonger[39512]: HM2oOnlRODdKJ+MGXzkxfVxkuQvajxdfniMfFoYERwHLJJeXEHsL+MNgpqmtmZi2 Oct 11 08:04:46 np0005481015 certmonger[39512]: UydKGssKdwQNzXlCVEYea3i/87OGchXEB+/l3SVpDbaIwdik2V1w9RjqSnyUuYJ4 Oct 11 08:04:46 np0005481015 certmonger[39512]: OKd8n2UOCF/cz570otJeEl2ZtPcm++659gro+wC2ZYNmHAIEna8mRhjGtTqRj5Ju Oct 11 08:04:46 np0005481015 certmonger[39512]: m3WEexmUccLOhb7rsaRlFa8DdKvKcuFsyepu7kH/b7Ypulrv8wrak9FGj5w2S6uk Oct 11 08:04:46 np0005481015 certmonger[39512]: 7sFFpwUrOjrOhHD/fB2FqEVaTVORfAoan/VNzTCyAth0mVg74FcLeY7tVYlt5cLc Oct 11 08:04:46 np0005481015 certmonger[39512]: kl+ynDCGfQOJQ8k= Oct 11 08:04:46 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:04:46 np0005481015 certmonger[39512]: " Oct 11 08:04:46 np0005481015 certmonger[42824]: 2025-10-11 08:04:46 [42824] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:04:46 np0005481015 certmonger[42824]: MIIFdzCCA9+gAwIBAgIBQDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:46 np0005481015 certmonger[42824]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:46 np0005481015 certmonger[42824]: MDQ0NloXDTI3MTAxMjA4MDQ0NlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:46 np0005481015 certmonger[42824]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:46 np0005481015 certmonger[42824]: hvcNAQEBBQADggEPADCCAQoCggEBAIvI1D5dbtelciMW7Bn2eyHygGoE42LYWuKR Oct 11 08:04:46 np0005481015 certmonger[42824]: 6bHmNRxy3zUE5AeNIslY6fsmWPGF8UCjTyNMrP5iiC/GFAIELU/igfh82faEAomh Oct 11 08:04:46 np0005481015 certmonger[42824]: QrKDCl6BO1rIYQdp3QsBtI4WE/p/B6mIxdZNlkLHLkElIsV8oJbatLBI+GZqLBaC Oct 11 08:04:46 np0005481015 certmonger[42824]: yRljJtSBwbx24V9m1RMsjkr1Q7DsBlaSGq0AkDVzj+TuwBYpnPR61a8zVpyGi2Ts Oct 11 08:04:46 np0005481015 certmonger[42824]: gf7GIVRSJf+uy66umTAK5g0fBqKho4okm1MYnQPCxFLiWcSgZdmsV/ECNMQoA69i Oct 11 08:04:46 np0005481015 certmonger[42824]: 0nXtaPTtoqUYXjNjOsw5zbYQZ7MfzBoHWe8+qlmVagRXi6sZXw0CAwEAAaOCAggw Oct 11 08:04:46 np0005481015 certmonger[42824]: ggIEMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:46 np0005481015 certmonger[42824]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:46 np0005481015 certmonger[42824]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:46 np0005481015 certmonger[42824]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:46 np0005481015 certmonger[42824]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:46 np0005481015 certmonger[42824]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFN4UA/8WaK0ATdILO5GxMkDM Oct 11 08:04:46 np0005481015 certmonger[42824]: LwBDMIHhBgNVHREEgdkwgdaCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:46 np0005481015 certmonger[42824]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Oct 11 08:04:46 np0005481015 certmonger[42824]: AgOgMgwwbXlzcWwvbnAwMDA1NDgxMDE1LmludGVybmFsYXBpLm9vby50ZXN0QE9P Oct 11 08:04:46 np0005481015 certmonger[42824]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVt Oct 11 08:04:46 np0005481015 certmonger[42824]: eXNxbBshbnAwMDA1NDgxMDE1LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Oct 11 08:04:46 np0005481015 certmonger[42824]: DQEBCwUAA4IBgQCt45+6RUNaH2cPFnM3lE/LeBjdMniEoB/uzNp2OJaZYFNM7beb Oct 11 08:04:46 np0005481015 certmonger[42824]: H17vNEYRmH2TA8cfh4NxF+1om7lh6zbHOu7gyDIo9HhuNXBUkSpHxarwoka7HEfw Oct 11 08:04:46 np0005481015 certmonger[42824]: 82JJrviamD09dwaHqQ9h6dpcnS8TFXY+Jfmplcv66OuyJxLVrpY4qqkgCDoMATJE Oct 11 08:04:46 np0005481015 certmonger[42824]: HM2oOnlRODdKJ+MGXzkxfVxkuQvajxdfniMfFoYERwHLJJeXEHsL+MNgpqmtmZi2 Oct 11 08:04:46 np0005481015 certmonger[42824]: UydKGssKdwQNzXlCVEYea3i/87OGchXEB+/l3SVpDbaIwdik2V1w9RjqSnyUuYJ4 Oct 11 08:04:46 np0005481015 certmonger[42824]: OKd8n2UOCF/cz570otJeEl2ZtPcm++659gro+wC2ZYNmHAIEna8mRhjGtTqRj5Ju Oct 11 08:04:46 np0005481015 certmonger[42824]: m3WEexmUccLOhb7rsaRlFa8DdKvKcuFsyepu7kH/b7Ypulrv8wrak9FGj5w2S6uk Oct 11 08:04:46 np0005481015 certmonger[42824]: 7sFFpwUrOjrOhHD/fB2FqEVaTVORfAoan/VNzTCyAth0mVg74FcLeY7tVYlt5cLc Oct 11 08:04:46 np0005481015 certmonger[42824]: kl+ynDCGfQOJQ8k= Oct 11 08:04:46 np0005481015 certmonger[42824]: -----END CERTIFICATE----- Oct 11 08:04:46 np0005481015 certmonger[42824]: ". Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Certificate submission still ongoing. Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Certificate submission postprocessing complete. Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Child status = 0. Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Child output: Oct 11 08:04:46 np0005481015 certmonger[39512]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nkl+ynDCGfQOJQ8k=\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:04:46 np0005481015 certmonger[39512]: " Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:04:46 np0005481015 certmonger[39512]: MIIFdzCCA9+gAwIBAgIBQDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:04:46 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:04:46 np0005481015 certmonger[39512]: MDQ0NloXDTI3MTAxMjA4MDQ0NlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:04:46 np0005481015 certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:04:46 np0005481015 certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBAIvI1D5dbtelciMW7Bn2eyHygGoE42LYWuKR Oct 11 08:04:46 np0005481015 certmonger[39512]: 6bHmNRxy3zUE5AeNIslY6fsmWPGF8UCjTyNMrP5iiC/GFAIELU/igfh82faEAomh Oct 11 08:04:46 np0005481015 certmonger[39512]: QrKDCl6BO1rIYQdp3QsBtI4WE/p/B6mIxdZNlkLHLkElIsV8oJbatLBI+GZqLBaC Oct 11 08:04:46 np0005481015 certmonger[39512]: yRljJtSBwbx24V9m1RMsjkr1Q7DsBlaSGq0AkDVzj+TuwBYpnPR61a8zVpyGi2Ts Oct 11 08:04:46 np0005481015 certmonger[39512]: gf7GIVRSJf+uy66umTAK5g0fBqKho4okm1MYnQPCxFLiWcSgZdmsV/ECNMQoA69i Oct 11 08:04:46 np0005481015 certmonger[39512]: 0nXtaPTtoqUYXjNjOsw5zbYQZ7MfzBoHWe8+qlmVagRXi6sZXw0CAwEAAaOCAggw Oct 11 08:04:46 np0005481015 certmonger[39512]: ggIEMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:04:46 np0005481015 certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:04:46 np0005481015 certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:04:46 np0005481015 certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:04:46 np0005481015 certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:04:46 np0005481015 certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFN4UA/8WaK0ATdILO5GxMkDM Oct 11 08:04:46 np0005481015 certmonger[39512]: LwBDMIHhBgNVHREEgdkwgdaCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:04:46 np0005481015 certmonger[39512]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Oct 11 08:04:46 np0005481015 certmonger[39512]: AgOgMgwwbXlzcWwvbnAwMDA1NDgxMDE1LmludGVybmFsYXBpLm9vby50ZXN0QE9P Oct 11 08:04:46 np0005481015 certmonger[39512]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVt Oct 11 08:04:46 np0005481015 certmonger[39512]: eXNxbBshbnAwMDA1NDgxMDE1LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Oct 11 08:04:46 np0005481015 certmonger[39512]: DQEBCwUAA4IBgQCt45+6RUNaH2cPFnM3lE/LeBjdMniEoB/uzNp2OJaZYFNM7beb Oct 11 08:04:46 np0005481015 certmonger[39512]: H17vNEYRmH2TA8cfh4NxF+1om7lh6zbHOu7gyDIo9HhuNXBUkSpHxarwoka7HEfw Oct 11 08:04:46 np0005481015 certmonger[39512]: 82JJrviamD09dwaHqQ9h6dpcnS8TFXY+Jfmplcv66OuyJxLVrpY4qqkgCDoMATJE Oct 11 08:04:46 np0005481015 certmonger[39512]: HM2oOnlRODdKJ+MGXzkxfVxkuQvajxdfniMfFoYERwHLJJeXEHsL+MNgpqmtmZi2 Oct 11 08:04:46 np0005481015 certmonger[39512]: UydKGssKdwQNzXlCVEYea3i/87OGchXEB+/l3SVpDbaIwdik2V1w9RjqSnyUuYJ4 Oct 11 08:04:46 np0005481015 certmonger[39512]: OKd8n2UOCF/cz570otJeEl2ZtPcm++659gro+wC2ZYNmHAIEna8mRhjGtTqRj5Ju Oct 11 08:04:46 np0005481015 certmonger[39512]: m3WEexmUccLOhb7rsaRlFa8DdKvKcuFsyepu7kH/b7Ypulrv8wrak9FGj5w2S6uk Oct 11 08:04:46 np0005481015 certmonger[39512]: 7sFFpwUrOjrOhHD/fB2FqEVaTVORfAoan/VNzTCyAth0mVg74FcLeY7tVYlt5cLc Oct 11 08:04:46 np0005481015 certmonger[39512]: kl+ynDCGfQOJQ8k= Oct 11 08:04:46 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:04:46 np0005481015 certmonger[39512]: ". Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] No hooks set for pre-save command. Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] No hooks set for post-save command. Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:46 np0005481015 certmonger[42828]: Certificate in file "/etc/pki/tls/certs/mysql.crt" issued by CA and saved. Oct 11 08:04:46 np0005481015 certmonger[39512]: 2025-10-11 08:04:46 [39512] Wrote to /var/lib/certmonger/requests/20251011080445 Oct 11 08:04:47 np0005481015 python3[42844]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:04:54 np0005481015 podman[42845]: 2025-10-11 08:04:47.200844891 +0000 UTC m=+0.043315590 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Oct 11 08:04:54 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:55 np0005481015 python3[42955]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 cluster.common.tag/mariadb:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 08:04:55 np0005481015 podman[42956]: 2025-10-11 08:04:55.327069806 +0000 UTC m=+0.045011304 image tag eb2deacebcb0e732dc23a6e49150052f3f1724aa184df8abe621651e45eee06c cluster.common.tag/mariadb:pcmklatest Oct 11 08:04:55 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:04:56 np0005481015 python3[42983]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:04:56 np0005481015 python3[43003]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:04:59 np0005481015 python3[43020]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:05:02 np0005481015 python3[43037]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:05:03 np0005481015 python3[43053]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:05:04 np0005481015 python3[43069]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:05:04 np0005481015 python3[43087]: ansible-certificate_request Invoked with name=neutron_ovn dns=['np0005481015.internalapi.ooo.test'] principal=['neutron_ovn/np0005481015.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Oct 11 08:05:04 np0005481015 certmonger[39512]: 2025-10-11 08:05:04 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:04 np0005481015 certmonger[39512]: 2025-10-11 08:05:04 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:04 np0005481015 certmonger[39512]: 2025-10-11 08:05:04 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:04 np0005481015 certmonger[39512]: 2025-10-11 08:05:04 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:04 np0005481015 certmonger[39512]: 2025-10-11 08:05:04 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:04 np0005481015 certmonger[39512]: 2025-10-11 08:05:04 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:04 np0005481015 certmonger[39512]: 2025-10-11 08:05:04 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:04 np0005481015 certmonger[39512]: 2025-10-11 08:05:04 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:04 np0005481015 certmonger[39512]: 2025-10-11 08:05:04 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[43097]: 2025-10-11 08:05:05 [43097] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481015.internalapi.ooo.test" for child. Oct 11 08:05:05 np0005481015 certmonger[43097]: 2025-10-11 08:05:05 [43097] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481015.internalapi.ooo.test Oct 11 08:05:05 np0005481015 certmonger[43097]: " for child. Oct 11 08:05:05 np0005481015 certmonger[43097]: 2025-10-11 08:05:05 [43097] Setting "CERTMONGER_REQ_PRINCIPAL" to "neutron_ovn/np0005481015.internalapi.ooo.test@OOO.TEST Oct 11 08:05:05 np0005481015 certmonger[43097]: " for child. Oct 11 08:05:05 np0005481015 certmonger[43097]: 2025-10-11 08:05:05 [43097] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:05:05 np0005481015 certmonger[43097]: 2025-10-11 08:05:05 [43097] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:05:05 np0005481015 certmonger[43097]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDE1LmludGVybmFsYXBp Oct 11 08:05:05 np0005481015 certmonger[43097]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAulge4DQ1 Oct 11 08:05:05 np0005481015 certmonger[43097]: iekn2SZcfI3E1frhEP7kdVDcNHeYjkbz3KH8aSc1NwQ+ykfP2t/fYBgPAQXoHPZN Oct 11 08:05:05 np0005481015 certmonger[43097]: oM51MprlxQhaaZ710hA4H3+YgoafhphbZZOS4TbkF3wdyGjChF7VnufuvADp2s5C Oct 11 08:05:05 np0005481015 certmonger[43097]: a1x31FPmkZWxPLhL2vGyjQKTOqkDcrIafLTydu0lwFfcxQjsxY1oMyOsRQ5bUwFD Oct 11 08:05:05 np0005481015 certmonger[43097]: XH64CmZzIVHCmN1ii5ItOFk67uZvMWHIYAqKaylJsbOOQVKKCv5wwjGioGnndILh Oct 11 08:05:05 np0005481015 certmonger[43097]: RuxBw/iamM8NlOGGXEh/lQCSFmtILMKdH4nfz8UcMOf3uPWllvIvwrRolf1h7gCI Oct 11 08:05:05 np0005481015 certmonger[43097]: UMVVqQW2bkOcMQIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:05:05 np0005481015 certmonger[43097]: ADEAMQAwADgAMAA1ADAANDCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Oct 11 08:05:05 np0005481015 certmonger[43097]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU0ODEwMTUuaW50ZXJuYWxhcGkub29v Oct 11 08:05:05 np0005481015 certmonger[43097]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZuZXV0cm9uX292bi9ucDAwMDU0ODEwMTUu Oct 11 08:05:05 np0005481015 certmonger[43097]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Oct 11 08:05:05 np0005481015 certmonger[43097]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC25ldXRyb25fb3ZuGyFucDAwMDU0ODEwMTUu Oct 11 08:05:05 np0005481015 certmonger[43097]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Oct 11 08:05:05 np0005481015 certmonger[43097]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFDSIPYZ4Rl4URtxZpU7RlL2VRe9O Oct 11 08:05:05 np0005481015 certmonger[43097]: MA0GCSqGSIb3DQEBCwUAA4IBAQATkcFqDK5AXRM3bPcCpLqjSWbWZjqnzopfQqgc Oct 11 08:05:05 np0005481015 certmonger[43097]: XJ3YVWJ0kngq6OGmEQ22sRxTs2+megPL1eAdmy8Ulvh0LjMUmoCo8hhFWUm8AG+M Oct 11 08:05:05 np0005481015 certmonger[43097]: VGWoPiBnlKv/DnzDW/gykzcJBaZHPqaGVCeMoujXnqsDMjmR7ufORE1pLtV0zCiP Oct 11 08:05:05 np0005481015 certmonger[43097]: 5oBRxV7sGtfSebIgBoLHlPzpRbI0fRQk+3nb4SzX7FpML3ja5D/52rsULQGVlVy/ Oct 11 08:05:05 np0005481015 certmonger[43097]: RkIK9A/22t6uuY8A5GFoUbk6e+MqjWySHqP/gOjEEMFEn+76Qu8oWDvX5GpkqPJG Oct 11 08:05:05 np0005481015 certmonger[43097]: Yt+X4Cv2R1pH/gIW9/og42vpv/DBCg2M3/h9Bp6ZvrZTdV9x Oct 11 08:05:05 np0005481015 certmonger[43097]: -----END CERTIFICATE REQUEST----- Oct 11 08:05:05 np0005481015 certmonger[43097]: " for child. Oct 11 08:05:05 np0005481015 certmonger[43097]: 2025-10-11 08:05:05 [43097] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:05:05 np0005481015 certmonger[43097]: 2025-10-11 08:05:05 [43097] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAulge4DQ1iekn2SZcfI3E1frhEP7kdVDcNHeYjkbz3KH8aSc1NwQ+ykfP2t/fYBgPAQXoHPZNoM51MprlxQhaaZ710hA4H3+YgoafhphbZZOS4TbkF3wdyGjChF7VnufuvADp2s5Ca1x31FPmkZWxPLhL2vGyjQKTOqkDcrIafLTydu0lwFfcxQjsxY1oMyOsRQ5bUwFDXH64CmZzIVHCmN1ii5ItOFk67uZvMWHIYAqKaylJsbOOQVKKCv5wwjGioGnndILhRuxBw/iamM8NlOGGXEh/lQCSFmtILMKdH4nfz8UcMOf3uPWllvIvwrRolf1h7gCIUMVVqQW2bkOcMQIDAQAB" for child. Oct 11 08:05:05 np0005481015 certmonger[43097]: 2025-10-11 08:05:05 [43097] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:05:05 np0005481015 certmonger[43097]: 2025-10-11 08:05:05 [43097] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:05:05 np0005481015 certmonger[43097]: 2025-10-11 08:05:05 [43097] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:05:05 np0005481015 certmonger[43097]: 2025-10-11 08:05:05 [43097] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:05:05 np0005481015 certmonger[43097]: 2025-10-11 08:05:05 [43097] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[43097]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:05:05 np0005481015 certmonger[43097]: Certificate: "MIIFYzCCA8ugAwIBAgIBSDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4MDUwNVoXDTI3MTAxMjA4MDUwNVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALpYHuA0NYnpJ9kmXHyNxNX64RD+5HVQ3DR3mI5G89yh/GknNTcEPspHz9rf32AYDwEF6Bz2TaDOdTKa5cUIWmme9dIQOB9/mIKGn4aYW2WTkuE25Bd8HchowoRe1Z7n7rwA6drOQmtcd9RT5pGVsTy4S9rxso0CkzqpA3KyGny08nbtJcBX3MUI7MWNaDMjrEUOW1MBQ1x+uApmcyFRwpjdYouSLThZOu7mbzFhyGAKimspSbGzjkFSigr+cMIxoqBp53SC4UbsQcP4mpjPDZThhlxIf5UAkhZrSCzCnR+J38/FHDDn97j1pZbyL8K0aJX9Ye4AiFDFVakFtm5DnDECAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFIbgjd4fDH4UFhmeaJFhU4+Lpc6xMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3ZuL25wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4bIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEABAR/jndwGI9qV/aYAPHqu4dfHALe6efFBSuawbTtqYAKn5kNkoMbcVEJZJMwoRskTwR0g7Nm3j1aQKuBy0PELvsybgoRqpN9mWtFRYUT3CMmZErBVe83i6/T4AAePn+n4cxTAfW26/dJI+IFajNgk83EYk9bsbTcU/QCOvpP2xfKIzzCxNAaVFfEURY/VQBLoJbMJISwQDfDr2XgjrY1kdxD/YAWY+cmoPcgpMD4Rvo//85lP0Mf/yRi5QJCvxs3CP8TTsoZPdlNw+ij/vh6E2QTHRDjfhGDl68pwpStCXXcY5m/0Zbudkox6XQplr6NK9ujOyDfF8wnjrBoNN86puGQIOJga7eazKEFR7D4jOMdUkG3vdQB08sp+Xwh1CTt97/4n5IWnIjyMPA31+zQWQs0AsrzdXGK+XKlEAYthst+NlzaA7iyERdFTR7Syk3+Mv+6kDP+RETXT2IJBuxmJB/i8WlCBs++KiAWyA+Uk5XyTPI5774QDc9AN5Ost3hq" Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Certificate submission still ongoing. Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Certificate submission attempt complete. Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Child status = 0. Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Child output: Oct 11 08:05:05 np0005481015 certmonger[39512]: "-----BEGIN CERTIFICATE----- Oct 11 08:05:05 np0005481015 certmonger[39512]: MIIFYzCCA8ugAwIBAgIBSDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:05 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:05 np0005481015 certmonger[39512]: MDUwNVoXDTI3MTAxMjA4MDUwNVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:05 np0005481015 certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:05 np0005481015 certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBALpYHuA0NYnpJ9kmXHyNxNX64RD+5HVQ3DR3 Oct 11 08:05:05 np0005481015 certmonger[39512]: mI5G89yh/GknNTcEPspHz9rf32AYDwEF6Bz2TaDOdTKa5cUIWmme9dIQOB9/mIKG Oct 11 08:05:05 np0005481015 certmonger[39512]: n4aYW2WTkuE25Bd8HchowoRe1Z7n7rwA6drOQmtcd9RT5pGVsTy4S9rxso0Ckzqp Oct 11 08:05:05 np0005481015 certmonger[39512]: A3KyGny08nbtJcBX3MUI7MWNaDMjrEUOW1MBQ1x+uApmcyFRwpjdYouSLThZOu7m Oct 11 08:05:05 np0005481015 certmonger[39512]: bzFhyGAKimspSbGzjkFSigr+cMIxoqBp53SC4UbsQcP4mpjPDZThhlxIf5UAkhZr Oct 11 08:05:05 np0005481015 certmonger[39512]: SCzCnR+J38/FHDDn97j1pZbyL8K0aJX9Ye4AiFDFVakFtm5DnDECAwEAAaOCAfQw Oct 11 08:05:05 np0005481015 certmonger[39512]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:05 np0005481015 certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:05 np0005481015 certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:05 np0005481015 certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:05 np0005481015 certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:05 np0005481015 certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFIbgjd4fDH4UFhmeaJFhU4+L Oct 11 08:05:05 np0005481015 certmonger[39512]: pc6xMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:05 np0005481015 certmonger[39512]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3ZuL25wMDAwNTQ4MTAxNS5p Oct 11 08:05:05 np0005481015 certmonger[39512]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:05:05 np0005481015 certmonger[39512]: Ty5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4bIW5wMDAwNTQ4MTAxNS5p Oct 11 08:05:05 np0005481015 certmonger[39512]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEABAR/jndwGI9q Oct 11 08:05:05 np0005481015 certmonger[39512]: V/aYAPHqu4dfHALe6efFBSuawbTtqYAKn5kNkoMbcVEJZJMwoRskTwR0g7Nm3j1a Oct 11 08:05:05 np0005481015 certmonger[39512]: QKuBy0PELvsybgoRqpN9mWtFRYUT3CMmZErBVe83i6/T4AAePn+n4cxTAfW26/dJ Oct 11 08:05:05 np0005481015 certmonger[39512]: I+IFajNgk83EYk9bsbTcU/QCOvpP2xfKIzzCxNAaVFfEURY/VQBLoJbMJISwQDfD Oct 11 08:05:05 np0005481015 certmonger[39512]: r2XgjrY1kdxD/YAWY+cmoPcgpMD4Rvo//85lP0Mf/yRi5QJCvxs3CP8TTsoZPdlN Oct 11 08:05:05 np0005481015 certmonger[39512]: w+ij/vh6E2QTHRDjfhGDl68pwpStCXXcY5m/0Zbudkox6XQplr6NK9ujOyDfF8wn Oct 11 08:05:05 np0005481015 certmonger[39512]: jrBoNN86puGQIOJga7eazKEFR7D4jOMdUkG3vdQB08sp+Xwh1CTt97/4n5IWnIjy Oct 11 08:05:05 np0005481015 certmonger[39512]: MPA31+zQWQs0AsrzdXGK+XKlEAYthst+NlzaA7iyERdFTR7Syk3+Mv+6kDP+RETX Oct 11 08:05:05 np0005481015 certmonger[39512]: T2IJBuxmJB/i8WlCBs++KiAWyA+Uk5XyTPI5774QDc9AN5Ost3hq Oct 11 08:05:05 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:05:05 np0005481015 certmonger[39512]: " Oct 11 08:05:05 np0005481015 certmonger[43099]: 2025-10-11 08:05:05 [43099] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:05:05 np0005481015 certmonger[43099]: MIIFYzCCA8ugAwIBAgIBSDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:05 np0005481015 certmonger[43099]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:05 np0005481015 certmonger[43099]: MDUwNVoXDTI3MTAxMjA4MDUwNVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:05 np0005481015 certmonger[43099]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:05 np0005481015 certmonger[43099]: hvcNAQEBBQADggEPADCCAQoCggEBALpYHuA0NYnpJ9kmXHyNxNX64RD+5HVQ3DR3 Oct 11 08:05:05 np0005481015 certmonger[43099]: mI5G89yh/GknNTcEPspHz9rf32AYDwEF6Bz2TaDOdTKa5cUIWmme9dIQOB9/mIKG Oct 11 08:05:05 np0005481015 certmonger[43099]: n4aYW2WTkuE25Bd8HchowoRe1Z7n7rwA6drOQmtcd9RT5pGVsTy4S9rxso0Ckzqp Oct 11 08:05:05 np0005481015 certmonger[43099]: A3KyGny08nbtJcBX3MUI7MWNaDMjrEUOW1MBQ1x+uApmcyFRwpjdYouSLThZOu7m Oct 11 08:05:05 np0005481015 certmonger[43099]: bzFhyGAKimspSbGzjkFSigr+cMIxoqBp53SC4UbsQcP4mpjPDZThhlxIf5UAkhZr Oct 11 08:05:05 np0005481015 certmonger[43099]: SCzCnR+J38/FHDDn97j1pZbyL8K0aJX9Ye4AiFDFVakFtm5DnDECAwEAAaOCAfQw Oct 11 08:05:05 np0005481015 certmonger[43099]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:05 np0005481015 certmonger[43099]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:05 np0005481015 certmonger[43099]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:05 np0005481015 certmonger[43099]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:05 np0005481015 certmonger[43099]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:05 np0005481015 certmonger[43099]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFIbgjd4fDH4UFhmeaJFhU4+L Oct 11 08:05:05 np0005481015 certmonger[43099]: pc6xMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:05 np0005481015 certmonger[43099]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3ZuL25wMDAwNTQ4MTAxNS5p Oct 11 08:05:05 np0005481015 certmonger[43099]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:05:05 np0005481015 certmonger[43099]: Ty5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4bIW5wMDAwNTQ4MTAxNS5p Oct 11 08:05:05 np0005481015 certmonger[43099]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEABAR/jndwGI9q Oct 11 08:05:05 np0005481015 certmonger[43099]: V/aYAPHqu4dfHALe6efFBSuawbTtqYAKn5kNkoMbcVEJZJMwoRskTwR0g7Nm3j1a Oct 11 08:05:05 np0005481015 certmonger[43099]: QKuBy0PELvsybgoRqpN9mWtFRYUT3CMmZErBVe83i6/T4AAePn+n4cxTAfW26/dJ Oct 11 08:05:05 np0005481015 certmonger[43099]: I+IFajNgk83EYk9bsbTcU/QCOvpP2xfKIzzCxNAaVFfEURY/VQBLoJbMJISwQDfD Oct 11 08:05:05 np0005481015 certmonger[43099]: r2XgjrY1kdxD/YAWY+cmoPcgpMD4Rvo//85lP0Mf/yRi5QJCvxs3CP8TTsoZPdlN Oct 11 08:05:05 np0005481015 certmonger[43099]: w+ij/vh6E2QTHRDjfhGDl68pwpStCXXcY5m/0Zbudkox6XQplr6NK9ujOyDfF8wn Oct 11 08:05:05 np0005481015 certmonger[43099]: jrBoNN86puGQIOJga7eazKEFR7D4jOMdUkG3vdQB08sp+Xwh1CTt97/4n5IWnIjy Oct 11 08:05:05 np0005481015 certmonger[43099]: MPA31+zQWQs0AsrzdXGK+XKlEAYthst+NlzaA7iyERdFTR7Syk3+Mv+6kDP+RETX Oct 11 08:05:05 np0005481015 certmonger[43099]: T2IJBuxmJB/i8WlCBs++KiAWyA+Uk5XyTPI5774QDc9AN5Ost3hq Oct 11 08:05:05 np0005481015 certmonger[43099]: -----END CERTIFICATE----- Oct 11 08:05:05 np0005481015 certmonger[43099]: ". Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Certificate submission still ongoing. Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Certificate submission postprocessing complete. Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Child status = 0. Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Child output: Oct 11 08:05:05 np0005481015 certmonger[39512]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFYzCCA8ugAwIBAgIBSDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u\nVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4\nMDUwNVoXDTI3MTAxMjA4MDUwNVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV\nBAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI\nhvcNAQEBBQADggEPADCCAQoCggEBALpYHuA0NYnpJ9kmXHyNxNX64RD+5HVQ3DR3\nmI5G89yh/GknNTcEPspHz9rf32AYDwEF6Bz2TaDOdTKa5cUIWmme9dIQOB9/mIKG\nn4aYW2WTkuE25Bd8HchowoRe1Z7n7rwA6drOQmtcd9RT5pGVsTy4S9rxso0Ckzqp\nA3KyGny08nbtJcBX3MUI7MWNaDMjrEUOW1MBQ1x+uApmcyFRwpjdYouSLThZOu7m\nbzFhyGAKimspSbGzjkFSigr+cMIxoqBp53SC4UbsQcP4mpjPDZThhlxIf5UAkhZr\nSCzCnR+J38/FHDDn97j1pZbyL8K0aJX9Ye4AiFDFVakFtm5DnDECAwEAAaOCAfQw\nggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB\nBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw\nMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw\ncwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js\nL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD\nZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFIbgjd4fDH4UFhmeaJFhU4+L\npc6xMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u\ndGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3ZuL25wMDAwNTQ4MTAxNS5p\nbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P\nTy5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4bIW5wMDAwNTQ4MTAxNS5p\nbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEABAR/jndwGI9q\nV/aYAPHqu4dfHALe6efFBSuawbTtqYAKn5kNkoMbcVEJZJMwoRskTwR0g7Nm3j1a\nQKuBy0PELvsybgoRqpN9mWtFRYUT3CMmZErBVe83i6/T4AAePn+n4cxTAfW26/dJ\nI+IFajNgk83EYk9bsbTcU/QCOvpP2xfKIzzCxNAaVFfEURY/VQBLoJbMJISwQDfD\nr2XgjrY1kdxD/YAWY+cmoPcgpMD4Rvo//85lP0Mf/yRi5QJCvxs3CP8TTsoZPdlN\nw+ij/vh6E2QTHRDjfhGDl68pwpStCXXcY5m/0Zbudkox6XQplr6NK9ujOyDfF8wn\njrBoNN86puGQIOJga7eazKEFR7D4jOMdUkG3vdQB08sp+Xwh1CTt97/4n5IWnIjy\nMPA31+zQWQs0AsrzdXGK+XKlEAYthst+NlzaA7iyERdFTR7Syk3+Mv+6kDP+RETX\nT2IJBuxmJB/i8WlCBs++KiAWyA+Uk5XyTPI5774QDc9AN5Ost3hq\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:05:05 np0005481015 certmonger[39512]: " Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:05:05 np0005481015 certmonger[39512]: MIIFYzCCA8ugAwIBAgIBSDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:05 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:05 np0005481015 certmonger[39512]: MDUwNVoXDTI3MTAxMjA4MDUwNVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:05 np0005481015 certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:05 np0005481015 certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBALpYHuA0NYnpJ9kmXHyNxNX64RD+5HVQ3DR3 Oct 11 08:05:05 np0005481015 certmonger[39512]: mI5G89yh/GknNTcEPspHz9rf32AYDwEF6Bz2TaDOdTKa5cUIWmme9dIQOB9/mIKG Oct 11 08:05:05 np0005481015 certmonger[39512]: n4aYW2WTkuE25Bd8HchowoRe1Z7n7rwA6drOQmtcd9RT5pGVsTy4S9rxso0Ckzqp Oct 11 08:05:05 np0005481015 certmonger[39512]: A3KyGny08nbtJcBX3MUI7MWNaDMjrEUOW1MBQ1x+uApmcyFRwpjdYouSLThZOu7m Oct 11 08:05:05 np0005481015 certmonger[39512]: bzFhyGAKimspSbGzjkFSigr+cMIxoqBp53SC4UbsQcP4mpjPDZThhlxIf5UAkhZr Oct 11 08:05:05 np0005481015 certmonger[39512]: SCzCnR+J38/FHDDn97j1pZbyL8K0aJX9Ye4AiFDFVakFtm5DnDECAwEAAaOCAfQw Oct 11 08:05:05 np0005481015 certmonger[39512]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:05 np0005481015 certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:05 np0005481015 certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:05 np0005481015 certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:05 np0005481015 certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:05 np0005481015 certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFIbgjd4fDH4UFhmeaJFhU4+L Oct 11 08:05:05 np0005481015 certmonger[39512]: pc6xMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:05 np0005481015 certmonger[39512]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3ZuL25wMDAwNTQ4MTAxNS5p Oct 11 08:05:05 np0005481015 certmonger[39512]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:05:05 np0005481015 certmonger[39512]: Ty5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4bIW5wMDAwNTQ4MTAxNS5p Oct 11 08:05:05 np0005481015 certmonger[39512]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEABAR/jndwGI9q Oct 11 08:05:05 np0005481015 certmonger[39512]: V/aYAPHqu4dfHALe6efFBSuawbTtqYAKn5kNkoMbcVEJZJMwoRskTwR0g7Nm3j1a Oct 11 08:05:05 np0005481015 certmonger[39512]: QKuBy0PELvsybgoRqpN9mWtFRYUT3CMmZErBVe83i6/T4AAePn+n4cxTAfW26/dJ Oct 11 08:05:05 np0005481015 certmonger[39512]: I+IFajNgk83EYk9bsbTcU/QCOvpP2xfKIzzCxNAaVFfEURY/VQBLoJbMJISwQDfD Oct 11 08:05:05 np0005481015 certmonger[39512]: r2XgjrY1kdxD/YAWY+cmoPcgpMD4Rvo//85lP0Mf/yRi5QJCvxs3CP8TTsoZPdlN Oct 11 08:05:05 np0005481015 certmonger[39512]: w+ij/vh6E2QTHRDjfhGDl68pwpStCXXcY5m/0Zbudkox6XQplr6NK9ujOyDfF8wn Oct 11 08:05:05 np0005481015 certmonger[39512]: jrBoNN86puGQIOJga7eazKEFR7D4jOMdUkG3vdQB08sp+Xwh1CTt97/4n5IWnIjy Oct 11 08:05:05 np0005481015 certmonger[39512]: MPA31+zQWQs0AsrzdXGK+XKlEAYthst+NlzaA7iyERdFTR7Syk3+Mv+6kDP+RETX Oct 11 08:05:05 np0005481015 certmonger[39512]: T2IJBuxmJB/i8WlCBs++KiAWyA+Uk5XyTPI5774QDc9AN5Ost3hq Oct 11 08:05:05 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:05:05 np0005481015 certmonger[39512]: ". Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] No hooks set for pre-save command. Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] No hooks set for post-save command. Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:05 np0005481015 certmonger[43103]: Certificate in file "/etc/pki/tls/certs/neutron_ovn.crt" issued by CA and saved. Oct 11 08:05:05 np0005481015 certmonger[39512]: 2025-10-11 08:05:05 [39512] Wrote to /var/lib/certmonger/requests/20251011080504 Oct 11 08:05:06 np0005481015 python3[43119]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:05:07 np0005481015 python3[43139]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:05:10 np0005481015 python3[43156]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:05:13 np0005481015 python3[43173]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:05:14 np0005481015 python3[43189]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:05:14 np0005481015 python3[43205]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:05:15 np0005481015 python3[43223]: ansible-certificate_request Invoked with name=libvirt-vnc-client-cert dns=['np0005481015.internalapi.ooo.test'] principal=['libvirt-vnc/np0005481015.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep nova_vnc_proxy)#012service_crt="/etc/pki/tls/certs/libvirt-vnc-client-cert.crt"#012service_key="/etc/pki/tls/private/libvirt-vnc-client-cert.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012#012# Set permissions#012podman exec -u root "$container_name" chmod 0644 $service_crt#012podman exec -u root "$container_name" chmod 0640 $service_key#012podman exec -u root "$container_name" chgrp qemu $service_key#012#012# No need to trigger a reload for novnc proxy since the cert is not cached#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:05:15 np0005481015 certmonger[39512]: 2025-10-11 08:05:15 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:15 np0005481015 certmonger[39512]: 2025-10-11 08:05:15 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:15 np0005481015 certmonger[39512]: 2025-10-11 08:05:15 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:15 np0005481015 certmonger[39512]: 2025-10-11 08:05:15 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:15 np0005481015 certmonger[39512]: 2025-10-11 08:05:15 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:15 np0005481015 certmonger[39512]: 2025-10-11 08:05:15 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:15 np0005481015 certmonger[39512]: 2025-10-11 08:05:15 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:15 np0005481015 certmonger[39512]: 2025-10-11 08:05:15 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:15 np0005481015 certmonger[39512]: 2025-10-11 08:05:15 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:15 np0005481015 certmonger[39512]: 2025-10-11 08:05:15 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:15 np0005481015 certmonger[39512]: 2025-10-11 08:05:15 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:15 np0005481015 certmonger[39512]: 2025-10-11 08:05:15 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:15 np0005481015 certmonger[39512]: 2025-10-11 08:05:15 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:15 np0005481015 certmonger[39512]: 2025-10-11 08:05:15 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:15 np0005481015 certmonger[39512]: 2025-10-11 08:05:15 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:15 np0005481015 certmonger[39512]: 2025-10-11 08:05:15 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:15 np0005481015 certmonger[39512]: 2025-10-11 08:05:15 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:15 np0005481015 certmonger[43233]: 2025-10-11 08:05:15 [43233] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481015.internalapi.ooo.test" for child. Oct 11 08:05:15 np0005481015 certmonger[43233]: 2025-10-11 08:05:15 [43233] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481015.internalapi.ooo.test Oct 11 08:05:15 np0005481015 certmonger[43233]: " for child. Oct 11 08:05:15 np0005481015 certmonger[43233]: 2025-10-11 08:05:15 [43233] Setting "CERTMONGER_REQ_PRINCIPAL" to "libvirt-vnc/np0005481015.internalapi.ooo.test@OOO.TEST Oct 11 08:05:15 np0005481015 certmonger[43233]: " for child. Oct 11 08:05:15 np0005481015 certmonger[43233]: 2025-10-11 08:05:15 [43233] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:05:15 np0005481015 certmonger[43233]: 2025-10-11 08:05:15 [43233] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:05:15 np0005481015 certmonger[43233]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDE1LmludGVybmFsYXBp Oct 11 08:05:15 np0005481015 certmonger[43233]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzhsmZgIn Oct 11 08:05:15 np0005481015 certmonger[43233]: hj656J3kdDuCdAhNs1yRMsPiGOCfM+lrTKnS1p2DPrF9ytaO1HfRO8cFZAc1bR79 Oct 11 08:05:15 np0005481015 certmonger[43233]: h7aTKP2YM6t75jmhmcVkYR0iNuHqHOr6kRua2lbtKDgcZg1XM/DUgycYio+SllEP Oct 11 08:05:15 np0005481015 certmonger[43233]: Ot2FcclmB1kbDweC5HQaxt0xjDuDOkhEdvorV486S8z3OX+urcjq08NARycSfzdT Oct 11 08:05:15 np0005481015 certmonger[43233]: 0O/ORqyvrQDsnhX0kbQQVSuxqh602p87o1RyPxOmAKVQ0PD4lDb4/4LdA+0EB9ZG Oct 11 08:05:15 np0005481015 certmonger[43233]: NUk1usjvN8dDMdmq9Q2X9U62EBfEtzaWRqDY9holiYV7rUJCME0hyBSGria+Pim1 Oct 11 08:05:15 np0005481015 certmonger[43233]: NkyMU2IhRqs41wIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:05:15 np0005481015 certmonger[43233]: ADEAMQAwADgAMAA1ADEANTCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Oct 11 08:05:15 np0005481015 certmonger[43233]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU0ODEwMTUuaW50ZXJuYWxhcGkub29v Oct 11 08:05:15 np0005481015 certmonger[43233]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZsaWJ2aXJ0LXZuYy9ucDAwMDU0ODEwMTUu Oct 11 08:05:15 np0005481015 certmonger[43233]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Oct 11 08:05:15 np0005481015 certmonger[43233]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC2xpYnZpcnQtdm5jGyFucDAwMDU0ODEwMTUu Oct 11 08:05:15 np0005481015 certmonger[43233]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Oct 11 08:05:15 np0005481015 certmonger[43233]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFDSIPYZ4Rl4URtxZpU7RlL2VRe9O Oct 11 08:05:15 np0005481015 certmonger[43233]: MA0GCSqGSIb3DQEBCwUAA4IBAQAAfc3ZbVOUx9IFPuWwxArUFXm73dpc4Jt2eTQ2 Oct 11 08:05:15 np0005481015 certmonger[43233]: k5FmlyRMrJC9ekBkO/Epx0WsIoUkLNPgUWh3B42jg0dCVnXV0FG4tCdfTU5qRJsC Oct 11 08:05:15 np0005481015 certmonger[43233]: pZj7UiTTBn9OrB54e/UWRPvaW5hJNUetJmVfGC2+LBFMNMTxqIUPI7N5zro7+KPM Oct 11 08:05:15 np0005481015 certmonger[43233]: cBWSUinGqiWjQLpy3/kHGFcYKOENVbBpScZrD0iSsB8j4eqQwLlPecTQCZuKT5K8 Oct 11 08:05:15 np0005481015 certmonger[43233]: ZDoWyBR2OuKjnh4pl5667aqqCkYBgePoB2VxjWj8K4eM69wQaSBhxijz9IeDxlon Oct 11 08:05:15 np0005481015 certmonger[43233]: 99HBhi142wSBUy4vpqj1U4lt3K0c7fU5n7PyedEmxtYYtP/v Oct 11 08:05:15 np0005481015 certmonger[43233]: -----END CERTIFICATE REQUEST----- Oct 11 08:05:15 np0005481015 certmonger[43233]: " for child. Oct 11 08:05:15 np0005481015 certmonger[43233]: 2025-10-11 08:05:15 [43233] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:05:15 np0005481015 certmonger[43233]: 2025-10-11 08:05:15 [43233] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzhsmZgInhj656J3kdDuCdAhNs1yRMsPiGOCfM+lrTKnS1p2DPrF9ytaO1HfRO8cFZAc1bR79h7aTKP2YM6t75jmhmcVkYR0iNuHqHOr6kRua2lbtKDgcZg1XM/DUgycYio+SllEPOt2FcclmB1kbDweC5HQaxt0xjDuDOkhEdvorV486S8z3OX+urcjq08NARycSfzdT0O/ORqyvrQDsnhX0kbQQVSuxqh602p87o1RyPxOmAKVQ0PD4lDb4/4LdA+0EB9ZGNUk1usjvN8dDMdmq9Q2X9U62EBfEtzaWRqDY9holiYV7rUJCME0hyBSGria+Pim1NkyMU2IhRqs41wIDAQAB" for child. Oct 11 08:05:15 np0005481015 certmonger[43233]: 2025-10-11 08:05:15 [43233] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:05:15 np0005481015 certmonger[43233]: 2025-10-11 08:05:15 [43233] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:05:15 np0005481015 certmonger[43233]: 2025-10-11 08:05:15 [43233] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:05:15 np0005481015 certmonger[43233]: 2025-10-11 08:05:15 [43233] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:05:15 np0005481015 certmonger[43233]: 2025-10-11 08:05:15 [43233] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:05:15 np0005481015 certmonger[39512]: 2025-10-11 08:05:15 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:16 np0005481015 certmonger[43233]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:05:16 np0005481015 certmonger[43233]: Certificate: "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" Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Certificate submission still ongoing. Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Certificate submission attempt complete. Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Child status = 0. Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Child output: Oct 11 08:05:16 np0005481015 certmonger[39512]: "-----BEGIN CERTIFICATE----- Oct 11 08:05:16 np0005481015 certmonger[39512]: MIIFYzCCA8ugAwIBAgIBTDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:16 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:16 np0005481015 certmonger[39512]: MDUxNloXDTI3MTAxMjA4MDUxNlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:16 np0005481015 certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:16 np0005481015 certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBAM4bJmYCJ4Y+ueid5HQ7gnQITbNckTLD4hjg Oct 11 08:05:16 np0005481015 certmonger[39512]: nzPpa0yp0tadgz6xfcrWjtR30TvHBWQHNW0e/Ye2kyj9mDOre+Y5oZnFZGEdIjbh Oct 11 08:05:16 np0005481015 certmonger[39512]: 6hzq+pEbmtpW7Sg4HGYNVzPw1IMnGIqPkpZRDzrdhXHJZgdZGw8HguR0GsbdMYw7 Oct 11 08:05:16 np0005481015 certmonger[39512]: gzpIRHb6K1ePOkvM9zl/rq3I6tPDQEcnEn83U9Dvzkasr60A7J4V9JG0EFUrsaoe Oct 11 08:05:16 np0005481015 certmonger[39512]: tNqfO6NUcj8TpgClUNDw+JQ2+P+C3QPtBAfWRjVJNbrI7zfHQzHZqvUNl/VOthAX Oct 11 08:05:16 np0005481015 certmonger[39512]: xLc2lkag2PYaJYmFe61CQjBNIcgUhq4mvj4ptTZMjFNiIUarONcCAwEAAaOCAfQw Oct 11 08:05:16 np0005481015 certmonger[39512]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:16 np0005481015 certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:16 np0005481015 certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:16 np0005481015 certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:16 np0005481015 certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:16 np0005481015 certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFGy5X79cagety6NuMxOlK/0p Oct 11 08:05:16 np0005481015 certmonger[39512]: lu3wMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:16 np0005481015 certmonger[39512]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNmxpYnZpcnQtdm5jL25wMDAwNTQ4MTAxNS5p Oct 11 08:05:16 np0005481015 certmonger[39512]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:05:16 np0005481015 certmonger[39512]: Ty5URVNUoTswOaADAgEBoTIwMBsLbGlidmlydC12bmMbIW5wMDAwNTQ4MTAxNS5p Oct 11 08:05:16 np0005481015 certmonger[39512]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAV2mXDsnXDhav Oct 11 08:05:16 np0005481015 certmonger[39512]: 3T1QpCL9Zr5i0xv2+XDfr2Hz3U0d8KmJTZNlK9ti4CAf27Z7ti66wabnLx7Do00d Oct 11 08:05:16 np0005481015 certmonger[39512]: CHBTD7WCcrYbIYPQRYlmwEYfb6uiGSqB6cwP+hqiJzXc53Th0bKnmomAtbd/xPSw Oct 11 08:05:16 np0005481015 certmonger[39512]: Xw50ROS2/9gyuYJBUf9JR+ET5/yX1wGfTzxyaSpYKOm2tS0TQ2SmY1hU6WNG+DV8 Oct 11 08:05:16 np0005481015 certmonger[39512]: 4gbV0epnslfRjelfzPzIZgpR85pt9FStqmVdNc37ggLWUlyCZWp5d/uBpAuZY9xk Oct 11 08:05:16 np0005481015 certmonger[39512]: gQOyCFQ0lT/O9MetHPE3y56/PB1N/GIfc7ThV+cYslQHoMALKDLqkbezeaB0ZuMG Oct 11 08:05:16 np0005481015 certmonger[39512]: gNpdehsFstW2Rg9ci6diJRowMxENm1lauhIcQu9UIPwBBa5p5BVYF8K8UyR7Ow6W Oct 11 08:05:16 np0005481015 certmonger[39512]: 5nZkq3fOMCoyuugQutx37yf/IlvCx1W/alxaQjf7ld9cMCEcvghacQO5lPJlrY9B Oct 11 08:05:16 np0005481015 certmonger[39512]: ewemGsZxvj+WU8VEhfGQ1cw+odO/IbIt8oaypGXCFRvA+PEz1Lyc Oct 11 08:05:16 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:05:16 np0005481015 certmonger[39512]: " Oct 11 08:05:16 np0005481015 certmonger[43235]: 2025-10-11 08:05:16 [43235] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:05:16 np0005481015 certmonger[43235]: MIIFYzCCA8ugAwIBAgIBTDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:16 np0005481015 certmonger[43235]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:16 np0005481015 certmonger[43235]: MDUxNloXDTI3MTAxMjA4MDUxNlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:16 np0005481015 certmonger[43235]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:16 np0005481015 certmonger[43235]: hvcNAQEBBQADggEPADCCAQoCggEBAM4bJmYCJ4Y+ueid5HQ7gnQITbNckTLD4hjg Oct 11 08:05:16 np0005481015 certmonger[43235]: nzPpa0yp0tadgz6xfcrWjtR30TvHBWQHNW0e/Ye2kyj9mDOre+Y5oZnFZGEdIjbh Oct 11 08:05:16 np0005481015 certmonger[43235]: 6hzq+pEbmtpW7Sg4HGYNVzPw1IMnGIqPkpZRDzrdhXHJZgdZGw8HguR0GsbdMYw7 Oct 11 08:05:16 np0005481015 certmonger[43235]: gzpIRHb6K1ePOkvM9zl/rq3I6tPDQEcnEn83U9Dvzkasr60A7J4V9JG0EFUrsaoe Oct 11 08:05:16 np0005481015 certmonger[43235]: tNqfO6NUcj8TpgClUNDw+JQ2+P+C3QPtBAfWRjVJNbrI7zfHQzHZqvUNl/VOthAX Oct 11 08:05:16 np0005481015 certmonger[43235]: xLc2lkag2PYaJYmFe61CQjBNIcgUhq4mvj4ptTZMjFNiIUarONcCAwEAAaOCAfQw Oct 11 08:05:16 np0005481015 certmonger[43235]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:16 np0005481015 certmonger[43235]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:16 np0005481015 certmonger[43235]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:16 np0005481015 certmonger[43235]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:16 np0005481015 certmonger[43235]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:16 np0005481015 certmonger[43235]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFGy5X79cagety6NuMxOlK/0p Oct 11 08:05:16 np0005481015 certmonger[43235]: lu3wMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:16 np0005481015 certmonger[43235]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNmxpYnZpcnQtdm5jL25wMDAwNTQ4MTAxNS5p Oct 11 08:05:16 np0005481015 certmonger[43235]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:05:16 np0005481015 certmonger[43235]: Ty5URVNUoTswOaADAgEBoTIwMBsLbGlidmlydC12bmMbIW5wMDAwNTQ4MTAxNS5p Oct 11 08:05:16 np0005481015 certmonger[43235]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAV2mXDsnXDhav Oct 11 08:05:16 np0005481015 certmonger[43235]: 3T1QpCL9Zr5i0xv2+XDfr2Hz3U0d8KmJTZNlK9ti4CAf27Z7ti66wabnLx7Do00d Oct 11 08:05:16 np0005481015 certmonger[43235]: CHBTD7WCcrYbIYPQRYlmwEYfb6uiGSqB6cwP+hqiJzXc53Th0bKnmomAtbd/xPSw Oct 11 08:05:16 np0005481015 certmonger[43235]: Xw50ROS2/9gyuYJBUf9JR+ET5/yX1wGfTzxyaSpYKOm2tS0TQ2SmY1hU6WNG+DV8 Oct 11 08:05:16 np0005481015 certmonger[43235]: 4gbV0epnslfRjelfzPzIZgpR85pt9FStqmVdNc37ggLWUlyCZWp5d/uBpAuZY9xk Oct 11 08:05:16 np0005481015 certmonger[43235]: gQOyCFQ0lT/O9MetHPE3y56/PB1N/GIfc7ThV+cYslQHoMALKDLqkbezeaB0ZuMG Oct 11 08:05:16 np0005481015 certmonger[43235]: gNpdehsFstW2Rg9ci6diJRowMxENm1lauhIcQu9UIPwBBa5p5BVYF8K8UyR7Ow6W Oct 11 08:05:16 np0005481015 certmonger[43235]: 5nZkq3fOMCoyuugQutx37yf/IlvCx1W/alxaQjf7ld9cMCEcvghacQO5lPJlrY9B Oct 11 08:05:16 np0005481015 certmonger[43235]: ewemGsZxvj+WU8VEhfGQ1cw+odO/IbIt8oaypGXCFRvA+PEz1Lyc Oct 11 08:05:16 np0005481015 certmonger[43235]: -----END CERTIFICATE----- Oct 11 08:05:16 np0005481015 certmonger[43235]: ". Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Certificate submission still ongoing. Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Certificate submission postprocessing complete. Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Child status = 0. Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Child output: Oct 11 08:05:16 np0005481015 certmonger[39512]: "{"certificate":"-----BEGIN CERTIFICATE-----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\newemGsZxvj+WU8VEhfGQ1cw+odO/IbIt8oaypGXCFRvA+PEz1Lyc\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:05:16 np0005481015 certmonger[39512]: " Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:05:16 np0005481015 certmonger[39512]: MIIFYzCCA8ugAwIBAgIBTDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:16 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:16 np0005481015 certmonger[39512]: MDUxNloXDTI3MTAxMjA4MDUxNlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:16 np0005481015 certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:16 np0005481015 certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBAM4bJmYCJ4Y+ueid5HQ7gnQITbNckTLD4hjg Oct 11 08:05:16 np0005481015 certmonger[39512]: nzPpa0yp0tadgz6xfcrWjtR30TvHBWQHNW0e/Ye2kyj9mDOre+Y5oZnFZGEdIjbh Oct 11 08:05:16 np0005481015 certmonger[39512]: 6hzq+pEbmtpW7Sg4HGYNVzPw1IMnGIqPkpZRDzrdhXHJZgdZGw8HguR0GsbdMYw7 Oct 11 08:05:16 np0005481015 certmonger[39512]: gzpIRHb6K1ePOkvM9zl/rq3I6tPDQEcnEn83U9Dvzkasr60A7J4V9JG0EFUrsaoe Oct 11 08:05:16 np0005481015 certmonger[39512]: tNqfO6NUcj8TpgClUNDw+JQ2+P+C3QPtBAfWRjVJNbrI7zfHQzHZqvUNl/VOthAX Oct 11 08:05:16 np0005481015 certmonger[39512]: xLc2lkag2PYaJYmFe61CQjBNIcgUhq4mvj4ptTZMjFNiIUarONcCAwEAAaOCAfQw Oct 11 08:05:16 np0005481015 certmonger[39512]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:16 np0005481015 certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:16 np0005481015 certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:16 np0005481015 certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:16 np0005481015 certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:16 np0005481015 certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFGy5X79cagety6NuMxOlK/0p Oct 11 08:05:16 np0005481015 certmonger[39512]: lu3wMIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:16 np0005481015 certmonger[39512]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNmxpYnZpcnQtdm5jL25wMDAwNTQ4MTAxNS5p Oct 11 08:05:16 np0005481015 certmonger[39512]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:05:16 np0005481015 certmonger[39512]: Ty5URVNUoTswOaADAgEBoTIwMBsLbGlidmlydC12bmMbIW5wMDAwNTQ4MTAxNS5p Oct 11 08:05:16 np0005481015 certmonger[39512]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAV2mXDsnXDhav Oct 11 08:05:16 np0005481015 certmonger[39512]: 3T1QpCL9Zr5i0xv2+XDfr2Hz3U0d8KmJTZNlK9ti4CAf27Z7ti66wabnLx7Do00d Oct 11 08:05:16 np0005481015 certmonger[39512]: CHBTD7WCcrYbIYPQRYlmwEYfb6uiGSqB6cwP+hqiJzXc53Th0bKnmomAtbd/xPSw Oct 11 08:05:16 np0005481015 certmonger[39512]: Xw50ROS2/9gyuYJBUf9JR+ET5/yX1wGfTzxyaSpYKOm2tS0TQ2SmY1hU6WNG+DV8 Oct 11 08:05:16 np0005481015 certmonger[39512]: 4gbV0epnslfRjelfzPzIZgpR85pt9FStqmVdNc37ggLWUlyCZWp5d/uBpAuZY9xk Oct 11 08:05:16 np0005481015 certmonger[39512]: gQOyCFQ0lT/O9MetHPE3y56/PB1N/GIfc7ThV+cYslQHoMALKDLqkbezeaB0ZuMG Oct 11 08:05:16 np0005481015 certmonger[39512]: gNpdehsFstW2Rg9ci6diJRowMxENm1lauhIcQu9UIPwBBa5p5BVYF8K8UyR7Ow6W Oct 11 08:05:16 np0005481015 certmonger[39512]: 5nZkq3fOMCoyuugQutx37yf/IlvCx1W/alxaQjf7ld9cMCEcvghacQO5lPJlrY9B Oct 11 08:05:16 np0005481015 certmonger[39512]: ewemGsZxvj+WU8VEhfGQ1cw+odO/IbIt8oaypGXCFRvA+PEz1Lyc Oct 11 08:05:16 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:05:16 np0005481015 certmonger[39512]: ". Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] No hooks set for pre-save command. Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:16 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:05:16 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:16 np0005481015 certmonger[43312]: Certificate in file "/etc/pki/tls/certs/libvirt-vnc-client-cert.crt" issued by CA and saved. Oct 11 08:05:16 np0005481015 certmonger[39512]: 2025-10-11 08:05:16 [39512] Wrote to /var/lib/certmonger/requests/20251011080515 Oct 11 08:05:17 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:05:17 np0005481015 python3[43328]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:05:18 np0005481015 python3[43348]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:05:21 np0005481015 python3[43365]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:05:24 np0005481015 python3[43382]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:05:25 np0005481015 python3[43398]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:05:25 np0005481015 python3[43414]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:05:26 np0005481015 python3[43432]: ansible-certificate_request Invoked with name=novnc-proxy dns=['np0005481015.internalapi.ooo.test'] principal=['novnc-proxy/np0005481015.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep nova_vnc_proxy)#012service_crt="/etc/pki/tls/certs/novnc-proxy.crt"#012service_key="/etc/pki/tls/private/novnc-proxy.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012#012# Set permissions#012podman exec -u root "$container_name" chmod 0644 $service_crt#012podman exec -u root "$container_name" chmod 0640 $service_key#012podman exec -u root "$container_name" chgrp qemu $service_key#012#012# No need to trigger a reload for novnc proxy since the cert is not cached#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Oct 11 08:05:26 np0005481015 certmonger[39512]: 2025-10-11 08:05:26 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:26 np0005481015 certmonger[39512]: 2025-10-11 08:05:26 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:26 np0005481015 certmonger[39512]: 2025-10-11 08:05:26 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:26 np0005481015 certmonger[39512]: 2025-10-11 08:05:26 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:26 np0005481015 certmonger[39512]: 2025-10-11 08:05:26 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:26 np0005481015 certmonger[39512]: 2025-10-11 08:05:26 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:26 np0005481015 certmonger[39512]: 2025-10-11 08:05:26 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:26 np0005481015 certmonger[39512]: 2025-10-11 08:05:26 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:26 np0005481015 certmonger[39512]: 2025-10-11 08:05:26 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:26 np0005481015 certmonger[39512]: 2025-10-11 08:05:26 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:26 np0005481015 certmonger[39512]: 2025-10-11 08:05:26 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:26 np0005481015 certmonger[39512]: 2025-10-11 08:05:26 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:26 np0005481015 certmonger[39512]: 2025-10-11 08:05:26 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:26 np0005481015 certmonger[39512]: 2025-10-11 08:05:26 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:26 np0005481015 certmonger[39512]: 2025-10-11 08:05:26 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:26 np0005481015 certmonger[39512]: 2025-10-11 08:05:26 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:26 np0005481015 certmonger[39512]: 2025-10-11 08:05:26 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:26 np0005481015 certmonger[43442]: 2025-10-11 08:05:26 [43442] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481015.internalapi.ooo.test" for child. Oct 11 08:05:26 np0005481015 certmonger[43442]: 2025-10-11 08:05:26 [43442] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481015.internalapi.ooo.test Oct 11 08:05:26 np0005481015 certmonger[43442]: " for child. Oct 11 08:05:26 np0005481015 certmonger[43442]: 2025-10-11 08:05:26 [43442] Setting "CERTMONGER_REQ_PRINCIPAL" to "novnc-proxy/np0005481015.internalapi.ooo.test@OOO.TEST Oct 11 08:05:26 np0005481015 certmonger[43442]: " for child. Oct 11 08:05:26 np0005481015 certmonger[43442]: 2025-10-11 08:05:26 [43442] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:05:26 np0005481015 certmonger[43442]: 2025-10-11 08:05:26 [43442] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:05:26 np0005481015 certmonger[43442]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDE1LmludGVybmFsYXBp Oct 11 08:05:26 np0005481015 certmonger[43442]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAw4O5kM3F Oct 11 08:05:26 np0005481015 certmonger[43442]: HEjioq5c7qMDiWub6f7aJc7NRTK25pN7Ixq9cGY8uqKFbtjqXRpVjCNOHJiQfjEY Oct 11 08:05:26 np0005481015 certmonger[43442]: wmG7u+kN43pPzruBjrL1F+6jNnG4jaApGGGquin2qBphqMOXaDhN1/DHpRRXFcC1 Oct 11 08:05:26 np0005481015 certmonger[43442]: XtKIC1THGEsxnpR9aW5ldmZ39ZHqDZIKaSF6IsNtLyp0oLdS/vE12JWgw+JP3dcm Oct 11 08:05:26 np0005481015 certmonger[43442]: 8WI22smP8BwOEcOBPGGQhxjtrGGsZpxpVQ6ha2O155bz81ivnzWZ8cXZmbEhsxzr Oct 11 08:05:26 np0005481015 certmonger[43442]: i+nX1iESYsKISuzoSPsxsGBQlZ2ftbrN4b5FeBuvMmra/PJpEPUwkTgOmCc2nxWB Oct 11 08:05:26 np0005481015 certmonger[43442]: 5dESb86ovlZY2wIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:05:26 np0005481015 certmonger[43442]: ADEAMQAwADgAMAA1ADIANjCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Oct 11 08:05:26 np0005481015 certmonger[43442]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU0ODEwMTUuaW50ZXJuYWxhcGkub29v Oct 11 08:05:26 np0005481015 certmonger[43442]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZub3ZuYy1wcm94eS9ucDAwMDU0ODEwMTUu Oct 11 08:05:26 np0005481015 certmonger[43442]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Oct 11 08:05:26 np0005481015 certmonger[43442]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC25vdm5jLXByb3h5GyFucDAwMDU0ODEwMTUu Oct 11 08:05:26 np0005481015 certmonger[43442]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Oct 11 08:05:26 np0005481015 certmonger[43442]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFDSIPYZ4Rl4URtxZpU7RlL2VRe9O Oct 11 08:05:26 np0005481015 certmonger[43442]: MA0GCSqGSIb3DQEBCwUAA4IBAQBDYLQB3iXrmSUGzcDbZMoZUYEz6Fu5JPwZPdaA Oct 11 08:05:26 np0005481015 certmonger[43442]: PS0fe73ugNp2GNkAtbZX5Dhgow8LKZQ5gtJeCgEfsI7ilodVjtToKENTjCjSwmaP Oct 11 08:05:26 np0005481015 certmonger[43442]: gIR9ztok0iRSkYhkhPcAepMBRMOBPC4uWYtG1n3d4BR/QfemO6t9wQcadyaAdD1Z Oct 11 08:05:26 np0005481015 certmonger[43442]: 2qzm1dWa5Iy/mP/4vjbMS2QNCurCmBzDRca5L0dd/dDa4ptDFI7hWfitvGkir80F Oct 11 08:05:26 np0005481015 certmonger[43442]: ODKAhP0JhAAugwA2JVJFJJCxrP5EcTiEsZ7RKwgNDtiKiWhCEpillkvaz/M1U3Ww Oct 11 08:05:26 np0005481015 certmonger[43442]: 3dEEsHOw69tmwkXv2JgmWSImwO6RnbPWRmC7v0WH952IQKVE Oct 11 08:05:26 np0005481015 certmonger[43442]: -----END CERTIFICATE REQUEST----- Oct 11 08:05:26 np0005481015 certmonger[43442]: " for child. Oct 11 08:05:26 np0005481015 certmonger[43442]: 2025-10-11 08:05:26 [43442] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:05:26 np0005481015 certmonger[43442]: 2025-10-11 08:05:26 [43442] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAw4O5kM3FHEjioq5c7qMDiWub6f7aJc7NRTK25pN7Ixq9cGY8uqKFbtjqXRpVjCNOHJiQfjEYwmG7u+kN43pPzruBjrL1F+6jNnG4jaApGGGquin2qBphqMOXaDhN1/DHpRRXFcC1XtKIC1THGEsxnpR9aW5ldmZ39ZHqDZIKaSF6IsNtLyp0oLdS/vE12JWgw+JP3dcm8WI22smP8BwOEcOBPGGQhxjtrGGsZpxpVQ6ha2O155bz81ivnzWZ8cXZmbEhsxzri+nX1iESYsKISuzoSPsxsGBQlZ2ftbrN4b5FeBuvMmra/PJpEPUwkTgOmCc2nxWB5dESb86ovlZY2wIDAQAB" for child. Oct 11 08:05:26 np0005481015 certmonger[43442]: 2025-10-11 08:05:26 [43442] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:05:26 np0005481015 certmonger[43442]: 2025-10-11 08:05:26 [43442] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:05:26 np0005481015 certmonger[43442]: 2025-10-11 08:05:26 [43442] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:05:26 np0005481015 certmonger[43442]: 2025-10-11 08:05:26 [43442] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:05:26 np0005481015 certmonger[43442]: 2025-10-11 08:05:26 [43442] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:05:26 np0005481015 certmonger[39512]: 2025-10-11 08:05:26 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:26 np0005481015 certmonger[43442]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:05:27 np0005481015 certmonger[43442]: Certificate: "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" Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Certificate submission still ongoing. Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Certificate submission attempt complete. Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Child status = 0. Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Child output: Oct 11 08:05:27 np0005481015 certmonger[39512]: "-----BEGIN CERTIFICATE----- Oct 11 08:05:27 np0005481015 certmonger[39512]: MIIFYzCCA8ugAwIBAgIBTzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:27 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:27 np0005481015 certmonger[39512]: MDUyN1oXDTI3MTAxMjA4MDUyN1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:27 np0005481015 certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:27 np0005481015 certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBAMODuZDNxRxI4qKuXO6jA4lrm+n+2iXOzUUy Oct 11 08:05:27 np0005481015 certmonger[39512]: tuaTeyMavXBmPLqihW7Y6l0aVYwjThyYkH4xGMJhu7vpDeN6T867gY6y9RfuozZx Oct 11 08:05:27 np0005481015 certmonger[39512]: uI2gKRhhqrop9qgaYajDl2g4Tdfwx6UUVxXAtV7SiAtUxxhLMZ6UfWluZXZmd/WR Oct 11 08:05:27 np0005481015 certmonger[39512]: 6g2SCmkheiLDbS8qdKC3Uv7xNdiVoMPiT93XJvFiNtrJj/AcDhHDgTxhkIcY7axh Oct 11 08:05:27 np0005481015 certmonger[39512]: rGacaVUOoWtjteeW8/NYr581mfHF2ZmxIbMc64vp19YhEmLCiErs6Ej7MbBgUJWd Oct 11 08:05:27 np0005481015 certmonger[39512]: n7W6zeG+RXgbrzJq2vzyaRD1MJE4DpgnNp8VgeXREm/OqL5WWNsCAwEAAaOCAfQw Oct 11 08:05:27 np0005481015 certmonger[39512]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:27 np0005481015 certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:27 np0005481015 certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:27 np0005481015 certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:27 np0005481015 certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:27 np0005481015 certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFGCVJtTg2JKiBD9ZuOwfz6Nq Oct 11 08:05:27 np0005481015 certmonger[39512]: 3WI/MIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:27 np0005481015 certmonger[39512]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5L25wMDAwNTQ4MTAxNS5p Oct 11 08:05:27 np0005481015 certmonger[39512]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:05:27 np0005481015 certmonger[39512]: Ty5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkbIW5wMDAwNTQ4MTAxNS5p Oct 11 08:05:27 np0005481015 certmonger[39512]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAMSbhy4jIlOaQ Oct 11 08:05:27 np0005481015 certmonger[39512]: YfdvE5OSk/iC9+w48JOSdTJTG68GAcm/WiGizWtQ1oUdOpX/qTxot3slDMEO44p+ Oct 11 08:05:27 np0005481015 certmonger[39512]: IZ/56DDIjyAOWsiSiYXvTpt+j4GGOCGfHgaMtyGuOGSP6go33+YHQc50TWBuxrTP Oct 11 08:05:27 np0005481015 certmonger[39512]: aq47jDWmC7betgJe52P1C9IiQ38Tt4/fp4vqw58jA56haYXNSNKqT+77xTvIvizE Oct 11 08:05:27 np0005481015 certmonger[39512]: cW9l9tMinSNnP8teIg/ncpPgB8y+Vx/+HIU8Hg0jvtVZbahV116UYqyuWP+sOPee Oct 11 08:05:27 np0005481015 certmonger[39512]: KEHR6u8kmzIYHfSFJAcgu0ssyzVvgPlakVifdAgs13EXZyywkp3cn/MTCCwg5YRy Oct 11 08:05:27 np0005481015 certmonger[39512]: KZZzjAu5IdXFm5aEDiXspi5fd4yj07+DYUzHte9SezeAW/lg5gZ/ILRPMIfMmi7j Oct 11 08:05:27 np0005481015 certmonger[39512]: +v0qEiEDOOsHSI+0Lp0LA5gu9+5PMM7dQWMgnv3ZCwH3j2oDd8fj4NLIaKIKusMf Oct 11 08:05:27 np0005481015 certmonger[39512]: yQPXqHxGceoTYxbTP0Sg5DbghsC/nGVZ2C5G2U6T+hNdponH+B27 Oct 11 08:05:27 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:05:27 np0005481015 certmonger[39512]: " Oct 11 08:05:27 np0005481015 certmonger[43444]: 2025-10-11 08:05:27 [43444] Postprocessing output "-----BEGIN CERTIFICATE----- Oct 11 08:05:27 np0005481015 certmonger[43444]: MIIFYzCCA8ugAwIBAgIBTzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:27 np0005481015 certmonger[43444]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:27 np0005481015 certmonger[43444]: MDUyN1oXDTI3MTAxMjA4MDUyN1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:27 np0005481015 certmonger[43444]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:27 np0005481015 certmonger[43444]: hvcNAQEBBQADggEPADCCAQoCggEBAMODuZDNxRxI4qKuXO6jA4lrm+n+2iXOzUUy Oct 11 08:05:27 np0005481015 certmonger[43444]: tuaTeyMavXBmPLqihW7Y6l0aVYwjThyYkH4xGMJhu7vpDeN6T867gY6y9RfuozZx Oct 11 08:05:27 np0005481015 certmonger[43444]: uI2gKRhhqrop9qgaYajDl2g4Tdfwx6UUVxXAtV7SiAtUxxhLMZ6UfWluZXZmd/WR Oct 11 08:05:27 np0005481015 certmonger[43444]: 6g2SCmkheiLDbS8qdKC3Uv7xNdiVoMPiT93XJvFiNtrJj/AcDhHDgTxhkIcY7axh Oct 11 08:05:27 np0005481015 certmonger[43444]: rGacaVUOoWtjteeW8/NYr581mfHF2ZmxIbMc64vp19YhEmLCiErs6Ej7MbBgUJWd Oct 11 08:05:27 np0005481015 certmonger[43444]: n7W6zeG+RXgbrzJq2vzyaRD1MJE4DpgnNp8VgeXREm/OqL5WWNsCAwEAAaOCAfQw Oct 11 08:05:27 np0005481015 certmonger[43444]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:27 np0005481015 certmonger[43444]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:27 np0005481015 certmonger[43444]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:27 np0005481015 certmonger[43444]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:27 np0005481015 certmonger[43444]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:27 np0005481015 certmonger[43444]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFGCVJtTg2JKiBD9ZuOwfz6Nq Oct 11 08:05:27 np0005481015 certmonger[43444]: 3WI/MIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:27 np0005481015 certmonger[43444]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5L25wMDAwNTQ4MTAxNS5p Oct 11 08:05:27 np0005481015 certmonger[43444]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:05:27 np0005481015 certmonger[43444]: Ty5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkbIW5wMDAwNTQ4MTAxNS5p Oct 11 08:05:27 np0005481015 certmonger[43444]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAMSbhy4jIlOaQ Oct 11 08:05:27 np0005481015 certmonger[43444]: YfdvE5OSk/iC9+w48JOSdTJTG68GAcm/WiGizWtQ1oUdOpX/qTxot3slDMEO44p+ Oct 11 08:05:27 np0005481015 certmonger[43444]: IZ/56DDIjyAOWsiSiYXvTpt+j4GGOCGfHgaMtyGuOGSP6go33+YHQc50TWBuxrTP Oct 11 08:05:27 np0005481015 certmonger[43444]: aq47jDWmC7betgJe52P1C9IiQ38Tt4/fp4vqw58jA56haYXNSNKqT+77xTvIvizE Oct 11 08:05:27 np0005481015 certmonger[43444]: cW9l9tMinSNnP8teIg/ncpPgB8y+Vx/+HIU8Hg0jvtVZbahV116UYqyuWP+sOPee Oct 11 08:05:27 np0005481015 certmonger[43444]: KEHR6u8kmzIYHfSFJAcgu0ssyzVvgPlakVifdAgs13EXZyywkp3cn/MTCCwg5YRy Oct 11 08:05:27 np0005481015 certmonger[43444]: KZZzjAu5IdXFm5aEDiXspi5fd4yj07+DYUzHte9SezeAW/lg5gZ/ILRPMIfMmi7j Oct 11 08:05:27 np0005481015 certmonger[43444]: +v0qEiEDOOsHSI+0Lp0LA5gu9+5PMM7dQWMgnv3ZCwH3j2oDd8fj4NLIaKIKusMf Oct 11 08:05:27 np0005481015 certmonger[43444]: yQPXqHxGceoTYxbTP0Sg5DbghsC/nGVZ2C5G2U6T+hNdponH+B27 Oct 11 08:05:27 np0005481015 certmonger[43444]: -----END CERTIFICATE----- Oct 11 08:05:27 np0005481015 certmonger[43444]: ". Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Certificate submission still ongoing. Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Certificate submission postprocessing complete. Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Child status = 0. Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Child output: Oct 11 08:05:27 np0005481015 certmonger[39512]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nyQPXqHxGceoTYxbTP0Sg5DbghsC/nGVZ2C5G2U6T+hNdponH+B27\n-----END CERTIFICATE-----\n","key_checked":true} Oct 11 08:05:27 np0005481015 certmonger[39512]: " Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Issued certificate is "-----BEGIN CERTIFICATE----- Oct 11 08:05:27 np0005481015 certmonger[39512]: MIIFYzCCA8ugAwIBAgIBTzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Oct 11 08:05:27 np0005481015 certmonger[39512]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTAxMTA4 Oct 11 08:05:27 np0005481015 certmonger[39512]: MDUyN1oXDTI3MTAxMjA4MDUyN1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Oct 11 08:05:27 np0005481015 certmonger[39512]: BAMMIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Oct 11 08:05:27 np0005481015 certmonger[39512]: hvcNAQEBBQADggEPADCCAQoCggEBAMODuZDNxRxI4qKuXO6jA4lrm+n+2iXOzUUy Oct 11 08:05:27 np0005481015 certmonger[39512]: tuaTeyMavXBmPLqihW7Y6l0aVYwjThyYkH4xGMJhu7vpDeN6T867gY6y9RfuozZx Oct 11 08:05:27 np0005481015 certmonger[39512]: uI2gKRhhqrop9qgaYajDl2g4Tdfwx6UUVxXAtV7SiAtUxxhLMZ6UfWluZXZmd/WR Oct 11 08:05:27 np0005481015 certmonger[39512]: 6g2SCmkheiLDbS8qdKC3Uv7xNdiVoMPiT93XJvFiNtrJj/AcDhHDgTxhkIcY7axh Oct 11 08:05:27 np0005481015 certmonger[39512]: rGacaVUOoWtjteeW8/NYr581mfHF2ZmxIbMc64vp19YhEmLCiErs6Ej7MbBgUJWd Oct 11 08:05:27 np0005481015 certmonger[39512]: n7W6zeG+RXgbrzJq2vzyaRD1MJE4DpgnNp8VgeXREm/OqL5WWNsCAwEAAaOCAfQw Oct 11 08:05:27 np0005481015 certmonger[39512]: ggHwMB8GA1UdIwQYMBaAFKZqN6oJ9Rsn/KfD2pJTsNcNPihpMDoGCCsGAQUFBwEB Oct 11 08:05:27 np0005481015 certmonger[39512]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Oct 11 08:05:27 np0005481015 certmonger[39512]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Oct 11 08:05:27 np0005481015 certmonger[39512]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Oct 11 08:05:27 np0005481015 certmonger[39512]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Oct 11 08:05:27 np0005481015 certmonger[39512]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFGCVJtTg2JKiBD9ZuOwfz6Nq Oct 11 08:05:27 np0005481015 certmonger[39512]: 3WI/MIHNBgNVHREEgcUwgcKCIW5wMDAwNTQ4MTAxNS5pbnRlcm5hbGFwaS5vb28u Oct 11 08:05:27 np0005481015 certmonger[39512]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5L25wMDAwNTQ4MTAxNS5p Oct 11 08:05:27 np0005481015 certmonger[39512]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Oct 11 08:05:27 np0005481015 certmonger[39512]: Ty5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkbIW5wMDAwNTQ4MTAxNS5p Oct 11 08:05:27 np0005481015 certmonger[39512]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAMSbhy4jIlOaQ Oct 11 08:05:27 np0005481015 certmonger[39512]: YfdvE5OSk/iC9+w48JOSdTJTG68GAcm/WiGizWtQ1oUdOpX/qTxot3slDMEO44p+ Oct 11 08:05:27 np0005481015 certmonger[39512]: IZ/56DDIjyAOWsiSiYXvTpt+j4GGOCGfHgaMtyGuOGSP6go33+YHQc50TWBuxrTP Oct 11 08:05:27 np0005481015 certmonger[39512]: aq47jDWmC7betgJe52P1C9IiQ38Tt4/fp4vqw58jA56haYXNSNKqT+77xTvIvizE Oct 11 08:05:27 np0005481015 certmonger[39512]: cW9l9tMinSNnP8teIg/ncpPgB8y+Vx/+HIU8Hg0jvtVZbahV116UYqyuWP+sOPee Oct 11 08:05:27 np0005481015 certmonger[39512]: KEHR6u8kmzIYHfSFJAcgu0ssyzVvgPlakVifdAgs13EXZyywkp3cn/MTCCwg5YRy Oct 11 08:05:27 np0005481015 certmonger[39512]: KZZzjAu5IdXFm5aEDiXspi5fd4yj07+DYUzHte9SezeAW/lg5gZ/ILRPMIfMmi7j Oct 11 08:05:27 np0005481015 certmonger[39512]: +v0qEiEDOOsHSI+0Lp0LA5gu9+5PMM7dQWMgnv3ZCwH3j2oDd8fj4NLIaKIKusMf Oct 11 08:05:27 np0005481015 certmonger[39512]: yQPXqHxGceoTYxbTP0Sg5DbghsC/nGVZ2C5G2U6T+hNdponH+B27 Oct 11 08:05:27 np0005481015 certmonger[39512]: -----END CERTIFICATE----- Oct 11 08:05:27 np0005481015 certmonger[39512]: ". Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Certificate issued (0 chain certificates, 0 roots). Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] No hooks set for pre-save command. Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:27 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:05:27 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:27 np0005481015 certmonger[43524]: Certificate in file "/etc/pki/tls/certs/novnc-proxy.crt" issued by CA and saved. Oct 11 08:05:27 np0005481015 certmonger[39512]: 2025-10-11 08:05:27 [39512] Wrote to /var/lib/certmonger/requests/20251011080526 Oct 11 08:05:28 np0005481015 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Oct 11 08:05:29 np0005481015 python3[43540]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Oct 11 08:05:30 np0005481015 python3[43560]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:05:33 np0005481015 python3[43578]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Oct 11 08:05:36 np0005481015 python3[43595]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:05:36 np0005481015 python3[43611]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Oct 11 08:05:37 np0005481015 python3[43627]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Oct 11 08:05:38 np0005481015 python3[43645]: ansible-certificate_request Invoked with name=ovn_dbs dns=['np0005481015.internalapi.ooo.test'] principal=['ovn_dbs/np0005481015.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Oct 11 08:05:38 np0005481015 certmonger[39512]: 2025-10-11 08:05:38 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481015 certmonger[39512]: 2025-10-11 08:05:38 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481015 certmonger[39512]: 2025-10-11 08:05:38 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481015 certmonger[39512]: 2025-10-11 08:05:38 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481015 certmonger[39512]: 2025-10-11 08:05:38 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481015 certmonger[39512]: 2025-10-11 08:05:38 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481015 certmonger[39512]: 2025-10-11 08:05:38 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481015 certmonger[39512]: 2025-10-11 08:05:38 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481015 certmonger[39512]: 2025-10-11 08:05:38 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481015 certmonger[39512]: 2025-10-11 08:05:38 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481015 certmonger[39512]: 2025-10-11 08:05:38 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481015 certmonger[39512]: 2025-10-11 08:05:38 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481015 certmonger[39512]: 2025-10-11 08:05:38 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481015 certmonger[39512]: 2025-10-11 08:05:38 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481015 certmonger[39512]: 2025-10-11 08:05:38 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481015 certmonger[39512]: 2025-10-11 08:05:38 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481015 certmonger[39512]: 2025-10-11 08:05:38 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481015 certmonger[43655]: 2025-10-11 08:05:38 [43655] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005481015.internalapi.ooo.test" for child. Oct 11 08:05:38 np0005481015 certmonger[43655]: 2025-10-11 08:05:38 [43655] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005481015.internalapi.ooo.test Oct 11 08:05:38 np0005481015 certmonger[43655]: " for child. Oct 11 08:05:38 np0005481015 certmonger[43655]: 2025-10-11 08:05:38 [43655] Setting "CERTMONGER_REQ_PRINCIPAL" to "ovn_dbs/np0005481015.internalapi.ooo.test@OOO.TEST Oct 11 08:05:38 np0005481015 certmonger[43655]: " for child. Oct 11 08:05:38 np0005481015 certmonger[43655]: 2025-10-11 08:05:38 [43655] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Oct 11 08:05:38 np0005481015 certmonger[43655]: 2025-10-11 08:05:38 [43655] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Oct 11 08:05:38 np0005481015 certmonger[43655]: MIID2DCCAsACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NDgxMDE1LmludGVybmFsYXBp Oct 11 08:05:38 np0005481015 certmonger[43655]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArQJSG3qz Oct 11 08:05:38 np0005481015 certmonger[43655]: RBoX2H1L8I2+kCfP71esLDz4Mp4jlvq0GBf7+cCY4wM6BcWPmlQ1IGxXIbZTLX0o Oct 11 08:05:38 np0005481015 certmonger[43655]: s78xbYX0Ha2O4XRNaowakNv12EX6VFv4xU8kGieKHAkL0f0S3xSoE0Jq2LIu5CYv Oct 11 08:05:38 np0005481015 certmonger[43655]: H86MHESAxEc3PlZiKSo3jFwPJSRXCN+4H8mmT6e31lvjlEwQhoaxCRWQ1pBFEPb0 Oct 11 08:05:38 np0005481015 certmonger[43655]: k+H+Z0+LrQr/tyPHU3oy75Txg8POoj1krstNcmzk8N6Z/4Bsw3J35h3cOmz5gcbZ Oct 11 08:05:38 np0005481015 certmonger[43655]: NWzJpYI0zxj+QremQMF2sXsPBwGkMVmi3KYNday4HtP7aWOkH///x6U5R2l3P5XP Oct 11 08:05:38 np0005481015 certmonger[43655]: IyZst3+B0dnH0QIDAQABoIIBZTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAw Oct 11 08:05:38 np0005481015 certmonger[43655]: ADEAMQAwADgAMAA1ADMAODCCATQGCSqGSIb3DQEJDjGCASUwggEhMAsGA1UdDwQE Oct 11 08:05:38 np0005481015 certmonger[43655]: AwIFoDCBxQYDVR0RBIG9MIG6giFucDAwMDU0ODEwMTUuaW50ZXJuYWxhcGkub29v Oct 11 08:05:38 np0005481015 certmonger[43655]: LnRlc3SgQgYKKwYBBAGCNxQCA6A0DDJvdm5fZGJzL25wMDAwNTQ4MTAxNS5pbnRl Oct 11 08:05:38 np0005481015 certmonger[43655]: cm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBRBgYrBgEFAgKgRzBFoAobCE9PTy5U Oct 11 08:05:38 np0005481015 certmonger[43655]: RVNUoTcwNaADAgEBoS4wLBsHb3ZuX2RicxshbnAwMDA1NDgxMDE1LmludGVybmFs Oct 11 08:05:38 np0005481015 certmonger[43655]: YXBpLm9vby50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNV Oct 11 08:05:38 np0005481015 certmonger[43655]: HRMBAf8EAjAAMB0GA1UdDgQWBBQ0iD2GeEZeFEbcWaVO0ZS9lUXvTjANBgkqhkiG Oct 11 08:05:38 np0005481015 certmonger[43655]: 9w0BAQsFAAOCAQEADN5nSz4/hzESYgO8LMKguw8GzGaCCXLW3+QPwJz0PUeyTPYj Oct 11 08:05:38 np0005481015 certmonger[43655]: C+FCytIKP4tFWp8TnkmFrchgoaACuilJdP8taMUQ7qkBMt/Vyd6FOQbjg1IQnQQE Oct 11 08:05:38 np0005481015 certmonger[43655]: aOVb9R0ov5L/cgyUIbzPGueQ9Scbj7zZQe6D2l323embrVEOwXF7mbNGy36JA2Hp Oct 11 08:05:38 np0005481015 certmonger[43655]: bfaaCfnV69ixuyPOvsQ2niVaSfZGWXbSQG4Ii+8H+BoHxzVhdiEpHcJdheuNlKwT Oct 11 08:05:38 np0005481015 certmonger[43655]: reAbEEGRN53dYTeEyXWAGccd7P2WsxA/+Yh/99c0rEH817K2Fq+js+AYlI2VvYvv Oct 11 08:05:38 np0005481015 certmonger[43655]: asXtrWiLSszacVZaekEg22nq3AaGRn4HEqVDKw== Oct 11 08:05:38 np0005481015 certmonger[43655]: -----END CERTIFICATE REQUEST----- Oct 11 08:05:38 np0005481015 certmonger[43655]: " for child. Oct 11 08:05:38 np0005481015 certmonger[43655]: 2025-10-11 08:05:38 [43655] Setting "CERTMONGER_SPKAC" to "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" for child. Oct 11 08:05:38 np0005481015 certmonger[43655]: 2025-10-11 08:05:38 [43655] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArQJSG3qzRBoX2H1L8I2+kCfP71esLDz4Mp4jlvq0GBf7+cCY4wM6BcWPmlQ1IGxXIbZTLX0os78xbYX0Ha2O4XRNaowakNv12EX6VFv4xU8kGieKHAkL0f0S3xSoE0Jq2LIu5CYvH86MHESAxEc3PlZiKSo3jFwPJSRXCN+4H8mmT6e31lvjlEwQhoaxCRWQ1pBFEPb0k+H+Z0+LrQr/tyPHU3oy75Txg8POoj1krstNcmzk8N6Z/4Bsw3J35h3cOmz5gcbZNWzJpYI0zxj+QremQMF2sXsPBwGkMVmi3KYNday4HtP7aWOkH///x6U5R2l3P5XPIyZst3+B0dnH0QIDAQAB" for child. Oct 11 08:05:38 np0005481015 certmonger[43655]: 2025-10-11 08:05:38 [43655] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Oct 11 08:05:38 np0005481015 certmonger[43655]: 2025-10-11 08:05:38 [43655] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Oct 11 08:05:38 np0005481015 certmonger[43655]: 2025-10-11 08:05:38 [43655] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Oct 11 08:05:38 np0005481015 certmonger[43655]: 2025-10-11 08:05:38 [43655] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Oct 11 08:05:38 np0005481015 certmonger[43655]: 2025-10-11 08:05:38 [43655] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Oct 11 08:05:38 np0005481015 certmonger[39512]: 2025-10-11 08:05:38 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:38 np0005481015 certmonger[43655]: Submitting request to "https://ipa.ooo.test/ipa/json". Oct 11 08:05:39 np0005481015 ipa-submit[43655]: JSON-RPC error: 2100: Insufficient access: Insufficient 'add' privilege to add the entry 'krbprincipalname=ovn_dbs/np0005481015.internalapi.ooo.test@OOO.TEST,cn=services,cn=accounts,dc=ooo,dc=test'. Oct 11 08:05:39 np0005481015 certmonger[39512]: 2025-10-11 08:05:39 [39512] Certificate submission still ongoing. Oct 11 08:05:39 np0005481015 certmonger[39512]: 2025-10-11 08:05:39 [39512] Certificate submission attempt complete. Oct 11 08:05:39 np0005481015 certmonger[39512]: 2025-10-11 08:05:39 [39512] Child status = 2. Oct 11 08:05:39 np0005481015 certmonger[39512]: 2025-10-11 08:05:39 [39512] Child output: Oct 11 08:05:39 np0005481015 certmonger[39512]: "Server at https://ipa.ooo.test/ipa/json denied our request, giving up: 2100 (Insufficient access: Insufficient 'add' privilege to add the entry 'krbprincipalname=ovn_dbs/np0005481015.internalapi.ooo.test@OOO.TEST,cn=services,cn=accounts,dc=ooo,dc=test'.). Oct 11 08:05:39 np0005481015 certmonger[39512]: " Oct 11 08:05:39 np0005481015 certmonger[39512]: 2025-10-11 08:05:39 [39512] Server at https://ipa.ooo.test/ipa/json denied our request, giving up: 2100 (Insufficient access: Insufficient 'add' privilege to add the entry 'krbprincipalname=ovn_dbs/np0005481015.internalapi.ooo.test@OOO.TEST,cn=services,cn=accounts,dc=ooo,dc=test'.). Oct 11 08:05:39 np0005481015 certmonger[39512]: 2025-10-11 08:05:39 [39512] Certificate not (yet?) issued. Oct 11 08:05:39 np0005481015 certmonger[39512]: 2025-10-11 08:05:39 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481015 certmonger[39512]: 2025-10-11 08:05:39 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:05:39 np0005481015 certmonger[43657]: Request for certificate to be stored in file "/etc/pki/tls/certs/ovn_dbs.crt" rejected by CA. Oct 11 08:05:39 np0005481015 certmonger[39512]: 2025-10-11 08:05:39 [39512] Wrote to /var/lib/certmonger/requests/20251011080538 Oct 11 08:23:00 np0005481015 sshd[43663]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:23:06 np0005481015 sshd[43664]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:23:08 np0005481015 sshd[43665]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:25:03 np0005481015 sshd[43666]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:25:19 np0005481015 systemd[1]: session-14.scope: Deactivated successfully. Oct 11 08:25:19 np0005481015 systemd[1]: session-14.scope: Consumed 2.987s CPU time. Oct 11 08:25:19 np0005481015 systemd-logind[36957]: Session 14 logged out. Waiting for processes to exit. Oct 11 08:25:19 np0005481015 systemd-logind[36957]: Removed session 14. Oct 11 08:25:21 np0005481015 sshd[43668]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:25:30 np0005481015 systemd[1]: Stopping User Manager for UID 1000... Oct 11 08:25:30 np0005481015 systemd[4180]: Activating special unit Exit the Session... Oct 11 08:25:30 np0005481015 systemd[4180]: Stopping podman-pause-c3b5644f.scope... Oct 11 08:25:30 np0005481015 systemd[4180]: Removed slice User Background Tasks Slice. Oct 11 08:25:30 np0005481015 systemd[4180]: Stopped target Main User Target. Oct 11 08:25:30 np0005481015 systemd[4180]: Stopped target Basic System. Oct 11 08:25:30 np0005481015 systemd[4180]: Stopped target Paths. Oct 11 08:25:30 np0005481015 systemd[4180]: Stopped target Sockets. Oct 11 08:25:30 np0005481015 systemd[4180]: Stopped target Timers. Oct 11 08:25:30 np0005481015 systemd[4180]: Stopped Mark boot as successful after the user session has run 2 minutes. Oct 11 08:25:30 np0005481015 systemd[4180]: Stopped Daily Cleanup of User's Temporary Directories. Oct 11 08:25:30 np0005481015 systemd[4180]: Stopping D-Bus User Message Bus... Oct 11 08:25:30 np0005481015 systemd[4180]: Stopped Create User's Volatile Files and Directories. Oct 11 08:25:30 np0005481015 dbus-broker[18344]: Dispatched 914 messages @ 3(±32)μs / message. Oct 11 08:25:30 np0005481015 systemd[4180]: Stopped podman-pause-c3b5644f.scope. Oct 11 08:25:30 np0005481015 systemd[4180]: Stopped D-Bus User Message Bus. Oct 11 08:25:30 np0005481015 systemd[4180]: Removed slice Slice /user. Oct 11 08:25:30 np0005481015 systemd[4180]: Closed D-Bus User Message Bus Socket. Oct 11 08:25:30 np0005481015 systemd[4180]: Removed slice User Application Slice. Oct 11 08:25:30 np0005481015 systemd[4180]: Reached target Shutdown. Oct 11 08:25:30 np0005481015 systemd[4180]: Finished Exit the Session. Oct 11 08:25:30 np0005481015 systemd[4180]: Reached target Exit the Session. Oct 11 08:25:30 np0005481015 systemd[1]: user@1000.service: Deactivated successfully. Oct 11 08:25:30 np0005481015 systemd[1]: Stopped User Manager for UID 1000. Oct 11 08:26:45 np0005481015 sshd[43671]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:31:55 np0005481015 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:6d:87:29 MACPROTO=0800 SRC=167.94.138.183 DST=38.102.83.132 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=1098 DF PROTO=TCP SPT=60898 DPT=19885 SEQ=3715312970 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AF3B6A75C000000000103030A) Oct 11 08:31:56 np0005481015 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:6d:87:29 MACPROTO=0800 SRC=167.94.138.183 DST=38.102.83.132 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=1099 DF PROTO=TCP SPT=60898 DPT=19885 SEQ=3715312970 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AF3B6AB6F000000000103030A) Oct 11 08:31:56 np0005481015 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:6d:87:29 MACPROTO=0800 SRC=167.94.138.183 DST=38.102.83.132 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=1042 DF PROTO=TCP SPT=60926 DPT=19885 SEQ=3378418293 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AF3B6ABB2000000000103030A) Oct 11 08:31:57 np0005481015 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:6d:87:29 MACPROTO=0800 SRC=167.94.138.183 DST=38.102.83.132 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=1043 DF PROTO=TCP SPT=60926 DPT=19885 SEQ=3378418293 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AF3B6AFAF000000000103030A) Oct 11 08:35:39 np0005481015 systemd[1]: session-15.scope: Deactivated successfully. Oct 11 08:35:39 np0005481015 systemd[1]: session-15.scope: Consumed 5min 54.394s CPU time. Oct 11 08:35:39 np0005481015 systemd-logind[36957]: Session 15 logged out. Waiting for processes to exit. Oct 11 08:35:39 np0005481015 systemd-logind[36957]: Removed session 15. Oct 11 08:35:49 np0005481015 systemd[1]: Stopping User Manager for UID 1002... Oct 11 08:35:49 np0005481015 systemd[26268]: Activating special unit Exit the Session... Oct 11 08:35:49 np0005481015 systemd[26268]: Removed slice User Background Tasks Slice. Oct 11 08:35:49 np0005481015 systemd[26268]: Stopped target Main User Target. Oct 11 08:35:49 np0005481015 systemd[26268]: Stopped target Basic System. Oct 11 08:35:49 np0005481015 systemd[26268]: Stopped target Paths. Oct 11 08:35:49 np0005481015 systemd[26268]: Stopped target Sockets. Oct 11 08:35:49 np0005481015 systemd[26268]: Stopped target Timers. Oct 11 08:35:49 np0005481015 systemd[26268]: Stopped Mark boot as successful after the user session has run 2 minutes. Oct 11 08:35:49 np0005481015 systemd[26268]: Stopped Daily Cleanup of User's Temporary Directories. Oct 11 08:35:49 np0005481015 systemd[26268]: Closed D-Bus User Message Bus Socket. Oct 11 08:35:49 np0005481015 systemd[26268]: Stopped Create User's Volatile Files and Directories. Oct 11 08:35:49 np0005481015 systemd[26268]: Removed slice User Application Slice. Oct 11 08:35:49 np0005481015 systemd[26268]: Reached target Shutdown. Oct 11 08:35:49 np0005481015 systemd[26268]: Finished Exit the Session. Oct 11 08:35:49 np0005481015 systemd[26268]: Reached target Exit the Session. Oct 11 08:35:49 np0005481015 systemd[1]: user@1002.service: Deactivated successfully. Oct 11 08:35:49 np0005481015 systemd[1]: Stopped User Manager for UID 1002. Oct 11 08:35:49 np0005481015 systemd[1]: Stopping User Runtime Directory /run/user/1002... Oct 11 08:35:49 np0005481015 systemd[1]: run-user-1002.mount: Deactivated successfully. Oct 11 08:35:49 np0005481015 systemd[1]: user-runtime-dir@1002.service: Deactivated successfully. Oct 11 08:35:49 np0005481015 systemd[1]: Stopped User Runtime Directory /run/user/1002. Oct 11 08:35:49 np0005481015 systemd[1]: Removed slice User Slice of UID 1002. Oct 11 08:35:49 np0005481015 systemd[1]: user-1002.slice: Consumed 5min 54.809s CPU time. Oct 11 08:39:14 np0005481015 sshd[43682]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:39:14 np0005481015 sshd[43683]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:41:58 np0005481015 sshd[43686]: main: sshd: ssh-rsa algorithm is disabled Oct 11 08:52:22 np0005481015 systemd[1]: Starting dnf makecache... Oct 11 08:52:22 np0005481015 dnf[43695]: Updating Subscription Management repositories. Oct 11 08:52:24 np0005481015 dnf[43695]: Metadata cache refreshed recently. Oct 11 08:52:24 np0005481015 systemd[1]: dnf-makecache.service: Deactivated successfully. Oct 11 08:52:24 np0005481015 systemd[1]: Finished dnf makecache. Oct 11 08:52:24 np0005481015 systemd[1]: dnf-makecache.service: Consumed 1.953s CPU time. Oct 11 09:11:09 np0005481015 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:6d:87:29 MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.132 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=22481 DF PROTO=TCP SPT=41982 DPT=19885 SEQ=428634832 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080ADCF6869B0000000001030307) Oct 11 09:11:09 np0005481015 sshd[43714]: main: sshd: ssh-rsa algorithm is disabled Oct 11 09:11:09 np0005481015 systemd[1]: Starting User Manager for UID 1000... Oct 11 09:11:09 np0005481015 systemd-logind[36957]: New session 17 of user zuul. Oct 11 09:11:09 np0005481015 systemd[43718]: Queued start job for default target Main User Target. Oct 11 09:11:09 np0005481015 systemd[43718]: Created slice User Application Slice. Oct 11 09:11:09 np0005481015 systemd[43718]: Started Mark boot as successful after the user session has run 2 minutes. Oct 11 09:11:09 np0005481015 systemd[43718]: Started Daily Cleanup of User's Temporary Directories. Oct 11 09:11:09 np0005481015 systemd[43718]: Reached target Paths. Oct 11 09:11:09 np0005481015 systemd[43718]: Reached target Timers. Oct 11 09:11:09 np0005481015 systemd[43718]: Starting D-Bus User Message Bus Socket... Oct 11 09:11:09 np0005481015 systemd[43718]: Starting Create User's Volatile Files and Directories... Oct 11 09:11:09 np0005481015 systemd[43718]: Listening on D-Bus User Message Bus Socket. Oct 11 09:11:09 np0005481015 systemd[43718]: Reached target Sockets. Oct 11 09:11:09 np0005481015 systemd[43718]: Finished Create User's Volatile Files and Directories. Oct 11 09:11:09 np0005481015 systemd[43718]: Reached target Basic System. Oct 11 09:11:09 np0005481015 systemd[43718]: Reached target Main User Target. Oct 11 09:11:09 np0005481015 systemd[43718]: Startup finished in 130ms. Oct 11 09:11:09 np0005481015 systemd[1]: Started User Manager for UID 1000. Oct 11 09:11:09 np0005481015 systemd[1]: Started Session 17 of User zuul. Oct 11 09:11:10 np0005481015 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:6d:87:29 MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.132 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=22482 DF PROTO=TCP SPT=41982 DPT=19885 SEQ=428634832 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080ADCF68A910000000001030307) Oct 11 09:11:10 np0005481015 python3[43749]: ansible-ansible.legacy.command Invoked with _raw_params=subscription-manager unregister#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-bd38-0707-00000000000c-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Oct 11 09:11:10 np0005481015 subscription-manager[43750]: Unregistered machine with identity: a2e47a36-fc43-459c-a93c-b0436366d6ee Oct 11 09:11:12 np0005481015 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:6d:87:29 MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.132 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=22483 DF PROTO=TCP SPT=41982 DPT=19885 SEQ=428634832 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080ADCF692910000000001030307) Oct 11 09:11:15 np0005481015 systemd[1]: session-17.scope: Deactivated successfully. Oct 11 09:11:15 np0005481015 systemd-logind[36957]: Session 17 logged out. Waiting for processes to exit. Oct 11 09:11:15 np0005481015 systemd-logind[36957]: Removed session 17. Oct 11 09:11:26 np0005481015 systemd[1]: Stopping User Manager for UID 1000... Oct 11 09:11:26 np0005481015 systemd[43718]: Activating special unit Exit the Session... Oct 11 09:11:26 np0005481015 systemd[43718]: Stopped target Main User Target. Oct 11 09:11:26 np0005481015 systemd[43718]: Stopped target Basic System. Oct 11 09:11:26 np0005481015 systemd[43718]: Stopped target Paths. Oct 11 09:11:26 np0005481015 systemd[43718]: Stopped target Sockets. Oct 11 09:11:26 np0005481015 systemd[43718]: Stopped target Timers. Oct 11 09:11:26 np0005481015 systemd[43718]: Stopped Mark boot as successful after the user session has run 2 minutes. Oct 11 09:11:26 np0005481015 systemd[43718]: Stopped Daily Cleanup of User's Temporary Directories. Oct 11 09:11:26 np0005481015 systemd[43718]: Closed D-Bus User Message Bus Socket. Oct 11 09:11:26 np0005481015 systemd[43718]: Stopped Create User's Volatile Files and Directories. Oct 11 09:11:26 np0005481015 systemd[43718]: Removed slice User Application Slice. Oct 11 09:11:26 np0005481015 systemd[43718]: Reached target Shutdown. Oct 11 09:11:26 np0005481015 systemd[43718]: Finished Exit the Session. Oct 11 09:11:26 np0005481015 systemd[43718]: Reached target Exit the Session. Oct 11 09:11:26 np0005481015 systemd[1]: user@1000.service: Deactivated successfully. Oct 11 09:11:26 np0005481015 systemd[1]: Stopped User Manager for UID 1000. Oct 11 09:11:26 np0005481015 sshd[43754]: main: sshd: ssh-rsa algorithm is disabled Oct 11 09:11:26 np0005481015 systemd[1]: Starting User Manager for UID 1000... Oct 11 09:11:26 np0005481015 systemd-logind[36957]: New session 19 of user zuul. Oct 11 09:11:26 np0005481015 systemd[43758]: Queued start job for default target Main User Target. Oct 11 09:11:26 np0005481015 systemd[43758]: Created slice User Application Slice. Oct 11 09:11:26 np0005481015 systemd[43758]: Started Mark boot as successful after the user session has run 2 minutes. Oct 11 09:11:26 np0005481015 systemd[43758]: Started Daily Cleanup of User's Temporary Directories. Oct 11 09:11:26 np0005481015 systemd[43758]: Reached target Paths. Oct 11 09:11:26 np0005481015 systemd[43758]: Reached target Timers.